参考文献

参考文献

[1] ISO/IEC 20000 (all parts), Information technology —** Service management

[2] ISO/IEC 27001|GB/T 22080 信息技术 安全技术 信息安全管理体系 要求(Information technology Security techniques Information security management systems Requirements**)

[3] ISO/IEC 27002|GB/T 22081 信息技术 安全技术 信息安全控制实践指南(Information technology Security techniques Code of practice for information security controls**)

[4] ISO/IEC 27003|GB/T 31496 信息技术 安全技术 信息安全管理体系实施指南(Information technology Security techniques Information security management system implementation guidance**)

[5] ISO/IEC 27004|GB/T 31497* 信息技术 安全技术 信息安全管理 测量(Information technology Security techniques Information security management Measurement*)

[6] ISO/IEC 27005|GB/T 31722 信息技术 安全技术 信息安全风险管理(Information technology Security techniques Information security risk management**)

[7] ISO/IEC 27010|GB/T 32920 信息技术 安全技术 行业间和组织间通信的信息安全管理(Information technology Security techniques Information security management for inter-sector and inter-organizational communications**)

[8] ISO/IEC 27031, Information technology —** Security techniques Guidelines for information and communication technology readiness for business continuity

[9] ISO/IEC 27033-1, Information technology —** Security techniques Network security Part 1: Overview and concepts

[10] ISO/IEC 27033-2, Information technology —** Security techniques Network security Part 2: Guidelines for the design and implementation of network security

[11] ISO/IEC TS 27033-3, Information technology —** Security techniques Network security Part 3: Reference networking scenarios Threats, design techniques and control issues

[12] ISO/IEC 27037, Information technology —** Security techniques Guidelines for identification, collection, acquisition and preservation of digital evidence

[13] ISO/IEC 27039, Information technology —** Security techniques Selection, deployment and operations of intrusion detection systems (IDPS)

[14] ISO/IEC 27041, Information technology —** Security techniques Guidance on assuring suitability and adequacy of incident investigative method

[15] ISO/IEC 27042, Information technology —** Security techniques Guidelines for the analysis and interpretation of digital evidence

[16] ISO/IEC 27043, Information technology —** Security techniques Incident investigation principles and processes

[17] ISO/IEC 29147, Information technology —** Security techniques Vulnerability disclosure

[18] ISO/IEC 30111, Information technology —** Security techniques Vulnerability handling processes

本文章首发在 网安wangan.com 网站上。

上一篇 下一篇
讨论数量: 0
只看当前版本


暂无话题~