BS ISO/IEC TR 13335-5:2001
Current
The latest, up-to-date edition.
Information technology. Guidelines for the management of IT security Management guidance of network security
Hardcopy , PDF
English
08-11-2001
Foreword
Introduction
1. SCOPE
2. REFERENCES
3. DEFINITIONS
4. ABBREVIATIONS
5. STRUCTURE
6. AIM
7. OVERVIEW
7.1 Background
7.2 Identification Process
8. REVIEW CORPORATE IT SECURITY POLICY REQUIREMENTS
9. REVIEW NETWORK ARCHITECTURES AND APPLICATIONS
9.1 Introduction
9.2 Types of Network
9.3 Network Protocols
9.4 Network Applications
9.5 Other Considerations
10. IDENTIFY TYPES OF NETWORK CONNECTION
11. REVIEW NETWORKING CHARACTERISTICS AND RELATED TRUST
RELATIONSHIPS
11.1 Network Characteristics
11.2 Trust Relationships
12. DETERMINE THE TYPE OF SECURITY RISK
13. IDENTIFY APPROPRIATE POTENTIAL SAFEGUARD AREAS
13.1 Introduction
13.2 Secure Operating Procedures
13.2.1 Introduction
13.2.2 Security Operating Procedures
13.2.3 Security Compliance Checking
13.2.4 Security Conditions For Connection
13.2.5 Documented Security Conditions for Users
of Network Services
13.2.6 Incident Handling
13.3 Identification and Authentication
13.3.1 Introduction
13.3.2 Remote Log-in
13.3.3 Authentication Enhancements
13.3.4 Remote System Identification
13.3.5 Secure Single Sign-on
13.4 Audit Trails
13.5 Intrusion Detection
13.6 Protection Against Malicious Code
13.7 Network Security Management
13.8 Security Gateways
13.9 Data Confidentiality Over Networks
13.10 Data Integrity over Networks
13.11 Non-Repudiation
13.12 Virtual Private Networks
13.13 Business Continuity/Disaster Recovery
14. DOCUMENT AND REVIEW SECURITY ARCHITECTURE OPTIONS
15. PREPARE FOR THE ALLOCATION OF SAFEGUARD SELECTION,
DESIGN, IMPLEMENTATION AND MAINTENANCE
16. SUMMARY
Bibliography
Provides guidance with respect to networks and communications to those responsible for the management of IT security. This guidance supports the identification and analysis of the communications related factors that should be taken into account to establish network security requirements.
Committee |
IST/33
|
DevelopmentNote |
Supersedes 01/652314 DC (11/2001)
|
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
Standards | Relationship |
ISO/IEC TR 13335-5:2001 | Identical |
PD 3002:2002 | GUIDE TO BS 7799 RISK ASSESSMENT |
ISO/IEC 7498-3:1997 | Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing |
ISO/IEC 7498-1:1994 | Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
ISO/IEC TR 13335-2:1997 | Information technology Guidelines for the management of IT Security Part 2: Managing and planning IT Security |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC TR 13335-3:1998 | Information technology Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
ISO/IEC TR 13335-4:2000 | Information technology Guidelines for the management of IT Security Part 4: Selection of safeguards |
ISO/IEC 7498-4:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework |
ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.