Статус документа
Статус документа

ГОСТ Р ИСО/МЭК 27033-1-2011 Информационная технология (ИТ). Методы и средства обеспечения безопасности. Безопасность сетей. Часть 1. Обзор и концепции

Библиография

[1]

ISO/IES 7498-1:1994

Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model

[2]

ISO 7498-2:1989

Information processing systems - Open Systems Interconnection - Basic Reference Model - Security Architecture

[3]

ISO/IEC 7498-3:1997

Information technology - Open Systems Interconnection - Basic Reference Model: Naming and Addressing

[4]

ISO/IEC 7498-4:1989

Information processing systems - Open Systems Interconnection - Basic Reference Model - Management Framework

[5]

ISO/IEC 9594-8

Information technology - Open Systems Interconnection - The Directory: Public key and attribute certificate trameworks

[6]

ISO/IEC 10181-1:1996

Information technology - Open Systems Interconnection - Security frameworks for open systems: Overview

[7]

ISO 11166-2

Banking - Key management by means of asymmetric algorithms - Part 2: Approved algorithms using the RSA cryptosystem

[8]

ISO 11568 (all parts)

Banking - Key management (retail)

[9]

ISO 11649

Financial services - Core banking - Structured creditor reference to remittance information

[10]

ISO/IEC 11770 (all parts)

Information technology - Security techniques - Key management

[11]

ISO/IEC 11889-1

Information technology - Trusted Platform Module - Part 1: Overview

[12]

ISO/IEC 11889-2

Information technology - Trusted Platform Module - Part 2: Design principles

[13]

ISO/IEC 11889-3

Information technology - Trusted Platform Module - Part 3: Structures

[14]

ISO/IEC 11889-4

Information technology - Trusted Platform Module - Part 4: Commands

[15]

ISO 13492

Financial services - Key management related data element - Application and usage of ISO 8583 data elements 53 and 96

[16]

ISO/IEC 13888 (all parts)

Information technology - Security techniques - Non-repudiation

[17]

ISO/IEC TR 14516:1999

Information technology - Security techniques - Guidelines for the use and Management of Trusted Third Party services

[18]

ISO/IEC 15288:2008

Systems and software engineering - System life cucle processes

[19]

ISO/IEC 18043:2006

Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems (IDS)

[20]

ISO/IEC TR 18044:2004*

Information technology - Security techniques - Information security incident management

_______________

* ISO/IEC TR 18044 будет отменен и заменен новой редакцией ISO/IEC 27035.

[21]

ISO 21188*

Banking Public Key Infrastructure

_______________  

* В тексте ISO указан ISO/IEC 21118 (Information to be included in specification sheets - Data projectors) - это опечатка.

[22]

ISO/PAS 22399:2007

Societal security - Guidelines for incident preparedness and operational continuity management

[23]

ISO/IEC 27003

Information technology - Security techniques - Information security management systems implementation guidance

[24]

ISO/IEC 27004

Information technology - Security techniques - Information security management - Measurement

[25]

IETF Site Security Handbook (RFC 2196), September 1997

[26]

IETF IP Security Document Roadmap (RFC 2411), November 1998

[27]

IETF Security Architecture for the Internet Protocol (RFC 2401), November 1998

[28]

IETF Address Allocation for Private Internets (RFC 1918), February 1996

[29]

IETF SNMP Security Protocols (RFC 1352), July 1992

[30]

IETF Internet Security Glossary (RFC 2828), May 2000

[31]

IETF Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing (RFC 2827), May 2000

[32]

NIST Special Publications (800 series) On Computer Security

[33]

NIST Special Publication 800-10: Keeping Your Site Comfortably Secure: An Inroduction to Internet Firewalls, December 1994