参考文献
参考文献
[1] ISO/IEC 20000 (all parts), Information technology —** Service management
[2] ISO/IEC 27001|GB/T 22080 信息技术 安全技术 信息安全管理体系 要求(Information technology — Security techniques — Information security management systems — Requirements**)
[3] ISO/IEC 27002|GB/T 22081 信息技术 安全技术 信息安全控制实践指南(Information technology — Security techniques — Code of practice for information security controls**)
[4] ISO/IEC 27003|GB/T 31496 信息技术 安全技术 信息安全管理体系实施指南(Information technology — Security techniques — Information security management system implementation guidance**)
[5] ISO/IEC 27004|GB/T 31497* 信息技术 安全技术 信息安全管理 测量(Information technology — Security techniques — Information security management — Measurement*)
[6] ISO/IEC 27005|GB/T 31722 信息技术 安全技术 信息安全风险管理(Information technology — Security techniques — Information security risk management**)
[7] ISO/IEC 27010|GB/T 32920 信息技术 安全技术 行业间和组织间通信的信息安全管理(Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications**)
[8] ISO/IEC 27031, Information technology —** Security techniques — Guidelines for information and communication technology readiness for business continuity
[9] ISO/IEC 27033-1, Information technology —** Security techniques — Network security — Part 1: Overview and concepts
[10] ISO/IEC 27033-2, Information technology —** Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
[11] ISO/IEC TS 27033-3, Information technology —** Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
[12] ISO/IEC 27037, Information technology —** Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
[13] ISO/IEC 27039, Information technology —** Security techniques — Selection, deployment and operations of intrusion detection systems (IDPS)
[14] ISO/IEC 27041, Information technology —** Security techniques — Guidance on assuring suitability and adequacy of incident investigative method
[15] ISO/IEC 27042, Information technology —** Security techniques — Guidelines for the analysis and interpretation of digital evidence
[16] ISO/IEC 27043, Information technology —** Security techniques — Incident investigation principles and processes
[17] ISO/IEC 29147, Information technology —** Security techniques — Vulnerability disclosure
[18] ISO/IEC 30111, Information technology —** Security techniques — Vulnerability handling processes
推荐文章: