ITU-T X.1051 Information technology – Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations - Study Group 17
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13.180
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- 35
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 35.180
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC TR 15504-7 Information technology - Process assessment - Part 7: Assessment of organizational maturity - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- ISO ISO/IEC 15408-2 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components - Third Edition
- ISO ISO/IEC 27039 Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- Картотека зарубежных и международных стандартов
Ссылается на
- В списке элементов: 15
- ISO ISO/IEC 27035-1 Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management - First EditionИнформационные технологии - методы безопасности - управление инцидентами Информационной безопасности - Часть 1: Принципы управления инцидентами - Первый Выпуск
Карточка документа - ISO ISO/IEC 27035-2 Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response - First EditionИнформационные технологии - методы безопасности - управление инцидентами Информационной безопасности - Часть 2: Инструкции, чтобы запланировать и подготовиться к реагированию на инциденты - Первый Выпуск
Карточка документа - ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth EditionИнформационные технологии - методы Безопасности - системы управления Информационной безопасностью - Обзор и словарь - Четвертый Выпуск
Карточка документа - ISO ISO/IEC 27001 CORR 2 Information technology - Security techniques - Information security management systems - Requirements TECHNICAL CORRIGENDUM 2 - Second EditionИнформационные технологии - методы безопасности - системы управления Информационной безопасностью - требования TECHNICAL CORRIGENDUM 2 - Второй Выпуск
Карточка документа - ISO ISO/IEC 27002 CORR 2 Information technology - Security techniques - Code of practice for information security controls TECHNICAL CORRIGENDUM 2 - Second EditionИнформационные технологии - методы Безопасности - Свод правил для управления защитой информации ТЕХНИЧЕСКОЕ ИСПРАВЛЕНИЕ 2 - Второй Выпуск
Карточка документа - ISO ISO/IEC 27033-1 Information technology - Security techniques - Network security - Part 1: Overview and concepts - Second EditionИнформационные технологии - методы Безопасности - сетевая безопасность - Часть 1: Обзор и понятия - Второй Выпуск
Карточка документа - ISO ISO/IEC 27039 Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) - First EditionИнформационные технологии - методы безопасности - Выбор, развертывание и операции систем обнаружения проникновения и предотвращения (IDPS) - Первый Выпуск
Карточка документа - ISO ISO/IEC 27036-2 Information technology - Security techniques - Information security for supplier relationships - Part 2: Requirements - First EditionИнформационные технологии - методы Безопасности - Информационная безопасность для отношений с поставщиками - Часть 2: Требования - Первый Выпуск
Карточка документа - ISO ISO/IEC 27033-4 Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways - First EditionИнформационные технологии - методы Безопасности - сетевая безопасность - Часть 4: Обеспечение связей между сетями с помощью шлюзов безопасности - Первый Выпуск
Карточка документа - ISO ISO/IEC 27036-3 Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security - First EditionИнформационные технологии - методы Безопасности - Информационная безопасность для отношений с поставщиками - Часть 3: Инструкции для безопасности цепочки поставки информационно-коммуникационных технологий - Первый Выпуск
Карточка документа - ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First EditionИнформационные технологии - методы Безопасности - сетевая безопасность - Часть 5: Обеспечение коммуникаций через сети с помощью Виртуальной частной сети (VPNs) - Первый Выпуск
Карточка документа - ISO ISO/IEC 27033-2 Information technology - Security techniques - Network security Part 2: Guidelines for the design and implementation of network security - First EditionИнформационные технологии - методы безопасности - Часть 2 сетевой безопасности: Рекомендации для разработки и реализации сетевой безопасности - Первый Выпуск
Карточка документа - ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second EditionИнформационные технологии - методы Безопасности - управление рисками Информационной безопасности - Второй Выпуск
Карточка документа - ISO ISO/IEC 27033-3 Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues - First EditionИнформационные технологии — методы Безопасности — сетевая безопасность — Часть 3: Ссылка сетевые сценарии — Угрозы, методы проектирования и проблемы управления - Первый Выпуск
На основе ISO ISO/IEC 27033-3 разработан ГОСТ Р ИСО/МЭК 27033-3-2014 (IDT)ГОСТ Р ИСО/МЭК 27033-3-2014 (IDT) - ISO ISO/IEC 27036-1 Information technology - Security techniques - Information security for supplier relationships - Part 1: Overview and concepts - First EditionИнформационные технологии - методы Безопасности - Информационная безопасность для отношений с поставщиками - Часть 1: Обзор и понятия - Первый Выпуск
Карточка документа



