Editor(s) Contributors Acronym Title. Technical Report on the successful use of security standards. Abbie Barbir. Trust elevation protocol

Size: px
Start display at page:

Download "Editor(s) Contributors Acronym Title. Technical Report on the successful use of security standards. Abbie Barbir. Trust elevation protocol"

Transcription

1 - 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period (14 23 March 2016) Abbie Barbir Abbie Barbir, Abbie Barbir, Alexey Koshka Bo Yu, Jie Yuan, Chen Zhang Byoung-Moon Chin, Vibha Tomar Cai Chen, Yiwen Wang Chang Oh Kim, Wataru Senga Changjin Lee, Deawoo Park, Damir Rajnovic X.TRsuss*** X.te X.1254rev* X.nessa* X.ticsc** X.samtn* X.sgsm X.gcspi** Z.161 Technical Report on the successful use of security standards Trust elevation protocol Entity authentication assurance framework Access control models for incidents exchange networks ITU-T X.1245 Supplement on Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE Security assessment techniques in telecommunication/ict networks ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations ITU-T X.1242 Supplement on Guidelines on countermeasures against short message service (SMS) phishing and smishing attack X.1521 Common vulnerability scoring system 3.0 Z Z Z Z TTCN-3 core language TTCN-3 language extensions: Support of interfaces with continuous signals TTCN-3 language extensions: Configuration and deployment support TTCN-3 language extensions: Advanced parameterization TTCN-3 language extensions: Behaviour types

2 - 2 - Z Z.164 Z.165 Z Z.166 Z.167 Z.168 Z.169 Z.170 Dongxin Liu, Hongwei Luo, Laifu Wang Eric Andersen, Michele Peiry X.sgmvno** X.pbact* X.509 Cor.2 X.500 X.501 X.509 X.511 X.518 X.519 TTCN-3 language extensions: Performance and real time testing TTCN-3 operational semantics TTCN-3 runtime interface (TRI) TTCN-3 extension package: Extended TRI TTCN-3 control interface (TCI) Using ASN.1 with TTCN-3 The IDL to TTCN-3 mapping Using XML schema with TTCN-3 TTCN-3 documentation comment specification ITU-T X.805 Supplement on Security guideline for mobile virtual network operator (MVNO) Privacy-based access control in telebiometrics Interconnection The Directory: Public-key and attribute certificate frameworks Technical Corrigendum 2 Interconnection The Directory: Overview of concepts, models and services Interconnection The Directory Models Interconnection The Directory Public-key and attribute certificate frameworks Interconnection The Directory Abstract service definition Interconnection The Directory Procedures for distributed operations Interconnection The Directory Protocol specifications

3 - 3 - Feng Gao, Laifu Wang, Annan Zhu Gao Feng, Haitao Du, Feng Zhang, Liang Wei Hirotaka Yoshida Hongwei Luo, Laifu Wang Huamin Jin, Laifu Wang, Mengxi Wang, Shuai Wang Huamin Jin, Shuai Wang, Hyoungshick Kim, JungSoo Park Hyungjin Lim, Jongyoul Park, Ik-Kyun Kim, Jong-Hyun Kim X.520 X.521 X.525 X.pki-em X.pki-prof X.1247 X.websec-6 X.voLTEsec-1 X.tigsc X.iotsec-1* X.tfcma* X.SRIaaS* X.cspim* X.sdnsec-1* X.websec-7 X.1542 (X.simef)* Interconnection The Directory Selected attribute types Interconnection The Directory Selected object classes Interconnection The Directory Replication Information technology Public-Key Infrastructure: Establishment and maintenance Information technology Public-Key Infrastructure: Profile Technical framework for countering mobile messaging spam Security framework and requirements for open capabilities of telecommunication services Security framework for voice-over-long-termevolution (VoLTE) network operation Technical implementation guidelines for ITU-T X.805 Simple encryption procedure for Internet of Things (IoT) environments Technical framework for countering mobile inapplication advertising spam Security requirements of public infrastructure as a service (IaaS) in cloud computing Technical requirements for countering instant messaging spam (SPIM) Security services using the software-defined networking Reference monitor for online analytics services Session information message exchange format

4 - 4 -, Bo Yu Jason Kim, Nak Hyun Kim, Yong Nyuo Shin Jean-Paul Lemaire Jun Seob Lee Bo Yu Kepeng Li, Feng Zhang Koji Nakao Kyeong Hee Oh, Wataru Senga Jae-Nam Ko,, Seung-Woo Yu Min Zuo Liu Lijun, Chen Zhang Masashi Eto, Koji Nakao X.sbb* X.tam X.894 (X.cms) X.oiddev X.1033 (X.gsiiso) X.msec-9* X.salcm X.sotavsu** X.1051rev X.sup-gpim** X.1256 X.msec-11* X.itssec-1* Security capability requirements for countering smartphone-based botnets A guideline to technical and operational countermeasures for telebiometric applications using mobile devices Information technology Generic applications of ASN.1 Cryptographic Message Syntax Information technology Use of object identifiers in the Internet of Things Guidelines on security of the individual information service provided by the operators Functional security requirements and architecture for mobile phone anti-theft measures Security reference architecture for lifecycle management of e-commerce business data Non-normative document Secure Over-the-Air Vehicle Software Updates Operational and Functional Requirements Information technology Security techniques Code of practice for Information security controls based on ISO/IEC for telecommunications organizations ITU-T X.gpim Supplement on Code of practice for personally identifiable information protection for telecommunications organizations Guidelines and framework for sharing network authentication results with service applications Guidelines on mitigating the negative effects of infected terminals in mobile networks Secure software update capability for intelligent transportation system communication devices Michele Peiry X.th2* Telebiometrics related to physics Michele Peiry X.th3* Telebiometrics related to chemistry Mijoo Kim, Jeong-Jun Suh, Mi Yeon Yoon X.Suppl.26 (X.sgsec-1)** Supplement 26 to ITU-T X-series Recommendations ITU-T X.1111 Supplement on security functional architecture for smart grid services using telecommunication networks

5 - 5 - Ming Feng, Jun Shen, Huirong Tian, Laifu Wang Myung Geun Chun, Jason Kim, Yong Nyuo Shin Nan Meng, Wei Liang Olivier Vuillemin Paul E. Thorpe X.1642 X.bhsm X.1641 (X.CSCDataSec)* X.th13 X.jsoner Guidelines for the operational security of cloud computing Information technology Security Techniques Telebiometric authentication framework using biometric hardware security module Guidelines for cloud service customer data security Holosphere to biosphere secure data acquisition and telecommunication protocol Information technology ASN.1 encoding rules: Specification of Javascript Object Notation (JSON) Encoding Rules (JSON/ER) Paul Gerome X.th4* Telebiometrics related to biology Paul Gerome X.th5* Telebiometrics related to culturology Paul Gerome X.th6* Telebiometrics related to psychology Radu Marian X.1257 Identity and access management taxonomy Richard Anago, Anfana Traore X.sup-gisb** Z.Imp100 Note (2) Z.100 Z.101 Z.102 Z.103 Z.104 Z.105 Z.106 Z.107 Z.111 ITU-T X.1054 Supplement on Best practice for implementation of Rec. ITU-T X.1054 ISO /IEC on governance of information security Case of Burkina Faso Specification and Description Language implementer's guide - Version of SDL-2010 Specification and Description Language - Basic SDL-2010 Specification and Description Language - Comprehensive SDL-2010 Specification and Description Language - Shorthand notation and annotation in SDL-2010 Specification and Description Language - Data and action language in SDL-2010 Specification and Description Language - SDL combined with ASN.1 modules Specification and Description Language - Common interchange format for SDL-2010 Specification and Description Language - Objectoriented data in SDL-2010 Notations and guidelines for the definition of ITU-T languages

6 - 6 - Z.100 Annex F1 Z.100 Annex F2 Z.100 Annex F3 Z.109 Z.151 Sandor Mazgon Sang-Woo Lee, Jae-Hoon Nah Soonjoung Byun, Tae Kyung Kim, Tae-Jin Lee, Jeong-Jun Suh Woong Go, Haeryong Park, Jeong-Jun Suh Xia Junjie, Kadobayashi Kadobayashi Kadobayashi, Daisuke Miyamoto X.itssec-2* X.gpim* X.1258 (X.eaaa)* X.Suppl.25 (X.gcsfmpd)** X.sgsec-2* X.iotsec-2* X.1500 Amd.9 X.1500 Amd.10*** X.cogent* of SDL SDL formal definition: General overview of SDL SDL formal definition: Static semantics of SDL SDL formal definition: Dynamic semantics Specification and Description Language - Unified modeling language profile for SDL-2010 User Requirements Notation (URN) - Language definition Security Compendia Security guidelines for V2X communication systems Information technology Security techniques Code of practice for Personally Identifiable Information protection Enhanced entity authentication based on aggregated attributes Supplement 25 to ITU-T X-series Recommendations ITU-T X.1231 Supplement on guidance to assist in countering spam for mobile phone developers Security guidelines for home area network (HAN) devices in smart grid systems Security framework for Internet of Things Overview of cybersecurity information exchange Amendment 9 Revised structured cybersecurity information exchange techniques Overview of cybersecurity information exchange Amendment 10 Revised structured cybersecurity information exchange techniques Design considerations for improved end-user perception of trustworthiness indicators

7 - 7 - Kadobayashi, Daisuke Miyamoto Dongya Wu Jae Hoon Nah Ruoni Wang, Peng Zhao Zhiyuan Hu, Min Shu, Ye Tao, Ni Zhang Zhiyuan Hu, Ye Tao X.metric* X.oid-iot** X.websec-8 X.1602 X.dsms* X.sdnsec-2 Metrics for evaluating threat and resilience in cyberspace ITU-T X.660 Supplement on Guidelines for using object identifiers for the Internet of Things Secure protection guidelines of value-added service for operators Security requirements for software as a service application environments Data security requirements for the monitoring service of cloud computing Security requirements and reference architecture for Software-Defined Networking

- 1 - X.ticsc. X.samtn. ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations

- 1 - X.ticsc. X.samtn. ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations - 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period 2013-2016 (8 17 September 2015) Abbie Barbir Alexey Koshka Bo Yu, Jie

More information

Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T)

Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T) Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T) Vasily Dolmatov ITU-T Study Group 17 Overview Primary focus is to build confidence and security in the use of Informa6on and Communica6on

More information

ITU-T SG 17 Achievements in ICT Security Standardization

ITU-T SG 17 Achievements in ICT Security Standardization ITU-T SG 17 Achievements in ICT Security Standardization Arkadiy Kremer (Chairman, ITU-T Study Group 17) kremer@rans.ru 6th ETSI SECURITY WORKSHOP, 19.01.2011 1/15 Topics ITU Plenipotentiary Conference

More information

Privacy Security IdM Trust Observations from ITU T Study Group 17

Privacy Security IdM Trust Observations from ITU T Study Group 17 Privacy Security IdM Trust Observations from ITU T Study Group 17 ETSI Security Week Security Workshop Session 3: Security in other Standards and Industry Forums Strategic overviews stress on Privacy work

More information

Security Standardization

Security Standardization ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012

More information

5G security activities and future plan in ITU-T SG17

5G security activities and future plan in ITU-T SG17 5G security activities and future plan in ITU-T SG17 Heung Youl Youm, PhD Chairman, ITU-T SG17 Professor, Soonchunhyang University, Korea(Rep. of) Content Strategic Vision for ITU-T SG17 Overview of 5G

More information

Introduction of ITU-T Study Group 17 Security for ITS perspective

Introduction of ITU-T Study Group 17 Security for ITS perspective Introduction of ITU-T Study Group 17 Security for ITS perspective (Primary focus in SG17 is to build confidence and security in the use of Information and Communication Technologies (ICTs)) July 29, 2015

More information

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 27017 First edition 2015-12-15 Information technology Security techniques Code of practice for information security

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Series X Supplement 31 (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

SC27 WG4 Mission. Security controls and services

SC27 WG4 Mission. Security controls and services copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information

More information

ITU-T Standardization on Countering Spam

ITU-T Standardization on Countering Spam Joint Internet Society, CITEL and ITU Workshop on Combating SPAM (Mendoza, Argentina, 7 October 2013) ITU-T Standardization on Countering Spam Sergio Scarabino Area Representative sergio.scarabino@itu.int

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-8 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 8: frameworks

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fourth edition 2001-08-01 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Technologies de l'information

More information

Secure Development Lifecycle

Secure Development Lifecycle Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications INTERNATIONAL STANDARD ISO/IEC 9594-5 Seventh edition 2014-03-01 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l'information Interconnexion

More information

Verasys Enterprise Security and IT Guide

Verasys Enterprise Security and IT Guide Verasys Enterprise Johnson Controls Milwaukee WI, USA www.verasyscontrols.com LIT-12013026 March 2018 Contents Introduction... 3 Microsoft Azure security and privacy... 5 Security... 5 Privacy...5 Compliance...5

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

ITU-T SG 17 Q10/17. Trust Elevation Frameworks ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1

ISO/IEC INTERNATIONAL STANDARD. Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1 INTERNATIONAL STANDARD ISO/IEC 8825-5 Third edition 2015-11-15 Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1 Technologies de l'information Règles de codage

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

IoT privacy risk management in ANASTACIA project

IoT privacy risk management in ANASTACIA project ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.

More information

Deploying Access Control using Extended XACML in Open Web Service Environment

Deploying Access Control using Extended XACML in Open Web Service Environment Deploying Access Control using Extended XACML in Open Web Service Environment Thirumaran.M Pondicherry Engg College Dhavachelvan.P Pondicherry University Divya.A Pondicherry Engg College ABSTRACT Now a

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré

More information

S2-2 Activities in Focus Group on Smart Grid in ITU-T

S2-2 Activities in Focus Group on Smart Grid in ITU-T TTC Workshop on EMC Standardization 2011 S2-2 Activities in Focus Group on Smart Grid in ITU-T Tsuyoshi Masuo NTT Energy and Environment Systems Laboratories 7 March 2011 1 What is Focus Group? Focus Group(FG)

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

Part 5: Protocol specifications

Part 5: Protocol specifications INTERNATIONAL STANDARD ISO/IEC 9594-5 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l information Interconnexion

More information

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam.

[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam. [NEC Group Internal Use Only] IoT Security - Challenges & Standardization status Sivabalan Arumugam Outline IoT Security Overview IoT Security Challenges IoT related Threats

More information

Part 7: Selected object classes

Part 7: Selected object classes INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist CLOUD SECURITY SPECIALIST Certification Cloud Security The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN. INTERNATIONAL STANDARD ISO/IEC 8824-4 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Technologies de l'information Notation

More information

ISO/IEC Information technology Open Systems Interconnection The Directory: Protocol specifications

ISO/IEC Information technology Open Systems Interconnection The Directory: Protocol specifications This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9594-5 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Protocol specifications

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Information object specification

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Information object specification INTERNATIONAL STANDARD ISO/IEC 8824-2 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Technologies de l'information Notation de syntaxe

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation INTERNATIONAL STANDARD ISO/IEC 9594-4 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Procedures for distributed operation Technologies de l'information Interconnexion

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU Driving Internet of Things (IoT) standardization to build smart sustainable cities Cristina Bueti, Adviser, ITU The world is Mobile broadband penetration globally is reaching 47% in 2015, a value that

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation INTERNATIONAL STANDARD ISO/IEC 8824-1 Fourth edition 2008-12-15 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Technologies de l'information Notation de syntaxe

More information

B C ISO/IEC 9595 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Common management information service

B C ISO/IEC 9595 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Common management information service INTERNATIONAL STANDARD ISO/IEC 9595 Third edition 1998-10-15 Information technology Open Systems Interconnection Common management information service Technologies de l'information Interconnexion de systèmes

More information

Cyber Security in ICT Networks: CITEL Perspectives

Cyber Security in ICT Networks: CITEL Perspectives Cyber Security in ICT Networks: CITEL Perspectives Wayne Zeuch Rapporteur, Standards Coordination CITEL PCC.I OAS Hemispheric Workshop on Cyber Security Rio de Janeiro Brazil Nov 16-18 2009 ICT Networks

More information

Electronic fee collection Information exchange between service provision and toll charging

Electronic fee collection Information exchange between service provision and toll charging Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 12855 Second edition 2015-12-15 Electronic fee collection Information exchange between service provision and toll charging Perception du télépéage

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

5G Revolution & Service security in Korea

5G Revolution & Service security in Korea 5G Revolution & Service security in Korea 2018.03.19. Jae Hoon Nah 5G Standardization timeline Standards development & deployment Source: IHS 2 Usage scenario for 5G (ITU-R) 3 Potential opportunities of

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

ISC2 EXAM - CISSP. Certified Information Systems Security Professional. Buy Full Product.

ISC2 EXAM - CISSP. Certified Information Systems Security Professional. Buy Full Product. ISC2 EXAM - CISSP Certified Information Systems Security Professional Buy Full Product http://www.examskey.com/cissp.html Examskey ISC2 CISSP exam demo product is here for you to test the quality of the

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Information and network security Network security

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Information and network security Network security I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1040 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions April 26, 2018 The Secure Technology Alliance IoT Security Council is pleased to submit our response to

More information

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech

More information

ITU-T Z.100. Specification and Description Language Overview of SDL-2010

ITU-T Z.100. Specification and Description Language Overview of SDL-2010 International Telecommunication Union ITU-T Z.100 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2011) SERIES Z: LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYSTEMS Formal description

More information

How do you decide what s best for you?

How do you decide what s best for you? How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility

More information

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 9: Replication

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 9: Replication INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-9 Seventh edition 2017-05 Information technology Open Systems Interconnection The Directory Part 9: Replication

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Abstract Syntax Notation One (ASN.

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Abstract Syntax Notation One (ASN. I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (08/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

Information technology MPEG systems technologies. Part 8: Coding-independent code points

Information technology MPEG systems technologies. Part 8: Coding-independent code points INTERNATIONAL STANDARD ISO/IEC 23001-8 Second edition 2016-05-01 Information technology MPEG systems technologies Part 8: Coding-independent code points Technologies de l information Technologies des systèmes

More information

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Message Handling Systems (MHS): MHS routing

ISO/IEC INTERNATIONAL STANDARD. Information technology Message Handling Systems (MHS): MHS routing INTERNATIONAL STANDARD ISO/IEC 10021-10 Second edition 1999-12-15 Information technology Message Handling Systems (MHS): MHS routing Technologies de l'information Systèmes de messagerie (MHS): Routage

More information

ISO/IEC JTC 1 N 13127

ISO/IEC JTC 1 N 13127 ISO/IEC JTC 1 N 13127 ISO/IEC JTC 1 Information technology Secretariat: ANSI (United States) Document type: Title: Status: Business Plan BUSINESS PLAN for JTC1/SC6, Telecommunications and Information Exchange

More information

ISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications

ISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications INTERNATIONAL STANDARD ISO/IEC 19785-4 First edition 2010-08-15 Information technology Common Biometric Exchange Formats Framework Part 4: Security block format specifications Technologies de l'information

More information

SDN-Based Network Security Functions for VoIP and VoLTE Services

SDN-Based Network Security Functions for VoIP and VoLTE Services SDN-Based Network Security Functions for VoIP and VoLTE Services Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jungsoo Park, and Taejin Ahn Department of Software, Sungkyunkwan University,

More information

ISO/IEC This is a preview - click here to buy the full publication INTERNATIONAL STANDARD. Second edition

ISO/IEC This is a preview - click here to buy the full publication INTERNATIONAL STANDARD. Second edition This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9834-1 Second edition 2005-07-15 Information technology Open Systems Interconnection Procedures for the operation

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion

More information

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,

More information

Telebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd.

Telebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd. Telebiometrics, and applications in Japan Yoshiaki ISOBE Systems Development Lab. Hitachi, Ltd. yoshiaki.isobe.en@hitachi.com 2 Introduction Biometrics i is one of Authentication ti ti technologies Authentication

More information

ASN.1 and the Connected Vehicle

ASN.1 and the Connected Vehicle ASN.1 and the Connected Vehicle Alessandro Triglia sandro@oss.com OSS Nokalva, Inc. 2 nd International Summit on the State of the Connected Vehicle Troy, MI 2010-09-30 ASN.1 ASN.1 = Abstract Syntax Notation

More information

Overview of the ISO/IEC Project

Overview of the ISO/IEC Project Overview of the ISO/IEC 30107 Project Anti-Spoofing and Liveness Detection Techniques Elaine Newton, PhD NIST elaine.newton@nist.gov 1-301-975-2532 1 Authentication Use Case For law enforcement, immigration,

More information

Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан)

Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан) Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан) Фарид Нахли, координатор программ, Региональный офис МСЭ 1 Санкт-Петербург, 19-20 июня 2017

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27011 First edition 2008-12-15 Information technology Security techniques Information security management guidelines for telecommunications organizations based on ISO/IEC

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

and Registration Authorities

and Registration Authorities Introduction to Object Identifiers (OIDs) and Introduction Registration to Authorities Object Identifiers (OIDs) and Registration Authorities France Telecom Orange Olivier Dubuisson 7 March 2011 Many approaches

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 23009-1 First edition 2012-04-01 Information technology Dynamic adaptive streaming over HTTP (DASH) Part 1: Media presentation description and segment formats Technologies

More information

PKCS #10 v1.7: Certification Request Syntax Standard (Final draft)

PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) RSA Laboratories May 4 th, 2000 Editor s note: This is the final draft of PKCS #10 v1.7, which is available for a 14-day public review

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation

More information

Applying Context to Web Authentication

Applying Context to Web Authentication Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,

More information

Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives

Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives Wayne Zeuch Rapporteur: Standards, Conformance, and Interoperability CITEL PCC.I ITU /CITEL Regional Cybersecurity Workshop

More information

Worldwide Standards and Regulations

Worldwide Standards and Regulations Worldwide Standards and Regulations Henry Wong Chief Technologist E 3 HS IT Consulting, LLC Copyright 1988 2016 Standard Performance Evaluation Corporation (SPEC). All rights reserved. JTC1 SC39 WG1 Convenor

More information

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System National Conference on Information Technology and Computer Science (CITCS 2012) Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System WANG Tian

More information

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation

More information

Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017

Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Security in Power System Automation Status and Application of IEC 62351 Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Operator Integrator Vendor IEC 62351-10 Power Systems Security Architecture

More information

LESSONS LEARNED IN SMART GRID CYBER SECURITY

LESSONS LEARNED IN SMART GRID CYBER SECURITY LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com

More information

Challenges in Developing National Cyber Security Policy Frameworks

Challenges in Developing National Cyber Security Policy Frameworks Challenges in Developing National Cyber Security Policy Frameworks Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection William McCrum Deputy Director General

More information