• Shopping Cart
    There are no items in your cart

CSA ISO/IEC 18028-5 : 2006

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS

Available format(s)

Hardcopy , PDF

Withdrawn date

06-09-2016

Language(s)

English

Published date

01-01-2006

€113.06
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
  3.1 Terms defined in other International Standards
  3.2 Terms defined in this part of ISO/IEC 18028
4 Abbreviated terms
5 Overview of VPNs
  5.1 Introduction
  5.2 Types of VPN
  5.3 VPN techniques
  5.4 Security aspects
6 VPN security objectives
7 VPN security requirements
  7.1 Confidentiality
  7.2 Integrity
  7.3 Authentication
  7.4 Authorization
  7.5 Availability
  7.6 Tunnel Endpoints
8 Guidelines for the selection of secure VPNs
  8.1 Regulatory and legislative aspects
  8.2 VPN management aspects
  8.3 VPN architectural aspects
9 Guidelines for the implementation of secure VPNs
  9.1 VPN management considerations
  9.2 VPN technical considerations
Annex A (informative) Technologies and protocols used to
                      implement VPNs
      A.1 Introduction
      A.2 Layer 2 VPNs
      A.3 Layer 3 VPNs
      A.4 Higher Layer VPNs
      A.5 Comparison of typical VPN protocol security features
Bibliography

Gives detailed direction with respect to the security aspects of using Virtual Private Network (VPN) connections to inter-connect networks, and also to connect remote users to networks.

DocumentType
Standard
Pages
40
PublisherName
Canadian Standards Association
Status
Withdrawn

Standards Relationship
ISO/IEC 18028-5:2006 Identical

ISO/IEC 18028-1:2006 Information technology Security techniques IT network security Part 1: Network security management
ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
ISO/IEC 18043:2006 Information technology Security techniques Selection, deployment and operations of intrusion detection systems
ISO/IEC 18028-2:2006 Information technology Security techniques IT network security Part 2: Network security architecture
ISO/IEC TR 15947:2002 Information technology Security techniques IT intrusion detection framework
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC TR 18044:2004 Information technology Security techniques Information security incident management
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
ISO/IEC 17799:2005 Information technology Security techniques Code of practice for information security management
ISO/IEC 13335-1:2004 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.