• Shopping Cart
    There are no items in your cart

BS ISO/IEC TR 13335-5:2001

Current

Current

The latest, up-to-date edition.

Information technology. Guidelines for the management of IT security Management guidance of network security

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

08-11-2001

€271.12
Excluding VAT

Foreword
Introduction
1. SCOPE
2. REFERENCES
3. DEFINITIONS
4. ABBREVIATIONS
5. STRUCTURE
6. AIM
7. OVERVIEW
    7.1 Background
    7.2 Identification Process
8. REVIEW CORPORATE IT SECURITY POLICY REQUIREMENTS
9. REVIEW NETWORK ARCHITECTURES AND APPLICATIONS
    9.1 Introduction
    9.2 Types of Network
    9.3 Network Protocols
    9.4 Network Applications
    9.5 Other Considerations
10. IDENTIFY TYPES OF NETWORK CONNECTION
11. REVIEW NETWORKING CHARACTERISTICS AND RELATED TRUST
    RELATIONSHIPS
    11.1 Network Characteristics
    11.2 Trust Relationships
12. DETERMINE THE TYPE OF SECURITY RISK
13. IDENTIFY APPROPRIATE POTENTIAL SAFEGUARD AREAS
    13.1 Introduction
    13.2 Secure Operating Procedures
          13.2.1 Introduction
          13.2.2 Security Operating Procedures
          13.2.3 Security Compliance Checking
          13.2.4 Security Conditions For Connection
          13.2.5 Documented Security Conditions for Users
                 of Network Services
          13.2.6 Incident Handling
    13.3 Identification and Authentication
          13.3.1 Introduction
          13.3.2 Remote Log-in
          13.3.3 Authentication Enhancements
          13.3.4 Remote System Identification
          13.3.5 Secure Single Sign-on
    13.4 Audit Trails
    13.5 Intrusion Detection
    13.6 Protection Against Malicious Code
    13.7 Network Security Management
    13.8 Security Gateways
    13.9 Data Confidentiality Over Networks
    13.10 Data Integrity over Networks
    13.11 Non-Repudiation
    13.12 Virtual Private Networks
    13.13 Business Continuity/Disaster Recovery
14. DOCUMENT AND REVIEW SECURITY ARCHITECTURE OPTIONS
15. PREPARE FOR THE ALLOCATION OF SAFEGUARD SELECTION,
    DESIGN, IMPLEMENTATION AND MAINTENANCE
16. SUMMARY
Bibliography

Provides guidance with respect to networks and communications to those responsible for the management of IT security. This guidance supports the identification and analysis of the communications related factors that should be taken into account to establish network security requirements.

Committee
IST/33
DevelopmentNote
Supersedes 01/652314 DC (11/2001)
DocumentType
Standard
Pages
40
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC TR 13335-5:2001 Identical

PD 3002:2002 GUIDE TO BS 7799 RISK ASSESSMENT

ISO/IEC 7498-3:1997 Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
ISO/IEC TR 13335-2:1997 Information technology Guidelines for the management of IT Security Part 2: Managing and planning IT Security
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC TR 13335-3:1998 Information technology Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
ISO/IEC TR 13335-4:2000 Information technology Guidelines for the management of IT Security Part 4: Selection of safeguards
ISO/IEC 7498-4:1989 Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework
ISO/IEC TR 13335-1:1996 Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.