[1] | ISO/IES 7498-1:1994 | Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model |
[2] | ISO 7498-2:1989 | Information processing systems - Open Systems Interconnection - Basic Reference Model - Security Architecture |
[3] | ISO/IEC 7498-3:1997 | Information technology - Open Systems Interconnection - Basic Reference Model: Naming and Addressing |
[4] | ISO/IEC 7498-4:1989 | Information processing systems - Open Systems Interconnection - Basic Reference Model - Management Framework |
[5] | ISO/IEC 9594-8 | Information technology - Open Systems Interconnection - The Directory: Public key and attribute certificate trameworks |
[6] | ISO/IEC 10181-1:1996 | Information technology - Open Systems Interconnection - Security frameworks for open systems: Overview |
[7] | ISO 11166-2 | Banking - Key management by means of asymmetric algorithms - Part 2: Approved algorithms using the RSA cryptosystem |
[8] | ISO 11568 (all parts) | Banking - Key management (retail) |
[9] | ISO 11649 | Financial services - Core banking - Structured creditor reference to remittance information |
[10] | ISO/IEC 11770 (all parts) | Information technology - Security techniques - Key management |
[11] | ISO/IEC 11889-1 | Information technology - Trusted Platform Module - Part 1: Overview |
[12] | ISO/IEC 11889-2 | Information technology - Trusted Platform Module - Part 2: Design principles |
[13] | ISO/IEC 11889-3 | Information technology - Trusted Platform Module - Part 3: Structures |
[14] | ISO/IEC 11889-4 | Information technology - Trusted Platform Module - Part 4: Commands |
[15] | ISO 13492 | Financial services - Key management related data element - Application and usage of ISO 8583 data elements 53 and 96 |
[16] | ISO/IEC 13888 (all parts) | Information technology - Security techniques - Non-repudiation |
[17] | ISO/IEC TR 14516:1999 | Information technology - Security techniques - Guidelines for the use and Management of Trusted Third Party services |
[18] | ISO/IEC 15288:2008 | Systems and software engineering - System life cucle processes |
[19] | ISO/IEC 18043:2006 | Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems (IDS) |
[20] | ISO/IEC TR 18044:2004* | Information technology - Security techniques - Information security incident management |
_______________ * ISO/IEC TR 18044 будет отменен и заменен новой редакцией ISO/IEC 27035. | ||
[21] | ISO 21188* | Banking Public Key Infrastructure |
_______________ * В тексте ISO указан ISO/IEC 21118 (Information to be included in specification sheets - Data projectors) - это опечатка. | ||
[22] | ISO/PAS 22399:2007 | Societal security - Guidelines for incident preparedness and operational continuity management |
[23] | ISO/IEC 27003 | Information technology - Security techniques - Information security management systems implementation guidance |
[24] | ISO/IEC 27004 | Information technology - Security techniques - Information security management - Measurement |
[25] | IETF Site Security Handbook (RFC 2196), September 1997 | |
[26] | IETF IP Security Document Roadmap (RFC 2411), November 1998 | |
[27] | IETF Security Architecture for the Internet Protocol (RFC 2401), November 1998 | |
[28] | IETF Address Allocation for Private Internets (RFC 1918), February 1996 | |
[29] | IETF SNMP Security Protocols (RFC 1352), July 1992 | |
[30] | IETF Internet Security Glossary (RFC 2828), May 2000 | |
[31] | IETF Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing (RFC 2827), May 2000 | |
[32] | NIST Special Publications (800 series) On Computer Security | |
[33] | NIST Special Publication 800-10: Keeping Your Site Comfortably Secure: An Inroduction to Internet Firewalls, December 1994 |