• TR 103 331 : 1.1.1

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    CYBER; STRUCTURED THREAT INFORMATION SHARING

    Available format(s): 

    Superseded date:  28-09-2019

    Language(s): 

    Published date:  03-10-2016

    Publisher:  European Telecommunications Standards Institute

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Modal verbs terminology
    Executive summary
    Introduction
    1 Scope
    2 References
    3 Definitions and abbreviations
    4 Means for exchanging structured cyber
      threat intelligence
    Annex A - Bibliography
    History

    Abstract - (Show below) - (Hide below)

    Gives an overview on the means for describing and exchanging cyber threat information in a standardized and structured manner.

    General Product Information - (Show below) - (Hide below)

    Committee CYBER
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Superseded

    Standards Referenced By This Book - (Show below) - (Hide below)

    TR 103 456 : 1.1.1 CYBER; IMPLEMENTATION OF THE NETWORK AND INFORMATION SECURITY (NIS) DIRECTIVE
    GR NFV-SEC 009 : 1.2.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; REPORT ON USE CASES AND TECHNICAL APPROACHES FOR MULTI-LAYER HOST ADMINISTRATION
    GS NFV-SEC 009 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; REPORT ON USE CASES AND TECHNICAL APPROACHES FOR MULTI-LAYER HOST ADMINISTRATION

    Standards Referencing This Book - (Show below) - (Hide below)

    GS ISI 002 : 1.2.1 INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY
    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    ISO/IEC 27004:2016 Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
    GS ISI 001-1 : 1.1.2 INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    GS ISI 005 : 1.1.1 INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR SECURITY EVENT DETECTION TESTING AND ASSESSMENT OF DETECTION EFFECTIVENESS
    GS ISI 004 : 1.1.1 INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR EVENT DETECTION IMPLEMENTATION
    GS ISI 001-2 : 1.1.2 INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1
    GS ISI 003 : 1.1.2 INFORMATION SECURITY INDICATORS (ISI); KEY PERFORMANCE SECURITY INDICATORS (KPSI) TO EVALUATE THE MATURITY OF SECURITY EVENT DETECTION
    TR 103 305 : 1.1.1 CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective