• Shopping Cart
    There are no items in your cart

CSA ISO/IEC TR 13335-5 : 2004

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

INFORMATION TECHNOLOGY - GUIDELINES FOR THE MANAGEMENT OF IT SECURITY - PART 5: MANAGEMENT GUIDANCE ON NETWORK SECURITY

Available format(s)

Hardcopy , PDF

Withdrawn date

09-08-2021

Language(s)

English

Published date

01-01-2004

€17.95
Excluding VAT

Foreword
Introduction
1 SCOPE
2 REFERENCES
3 DEFINITIONS
4 ABBREVIATIONS
5 STRUCTURE
6 AIM
7 OVERVIEW
   7.1 Background
   7.2 Identification Process
8 REVIEW CORPORATE IT SECURITY POLICY REQUIREMENTS
9 REVIEW NETWORK ARCHITECTURES AND APPLICATIONS
   9.1 Introduction
   9.2 Types of Network
   9.3 Network Protocols
   9.4 Network Applications
   9.5 Other Considerations
10 IDENTIFY TYPES OF NETWORK CONNECTION
11 REVIEW NETWORKING CHARACTERISTICS AND RELATED
   TRUST RELATIONSHIPS
   11.1 Network Characteristics
   11.2 Trust Relationships
12 DETERMINE THE TYPES OF SECURITY RISK
13 IDENTIFY APPROPRIATE POTENTIAL SAFEGUARD AREAS
   13.1 Introduction
   13.2 Secure Service Management
         13.2.1 Introduction
         13.2.2 Security Operating Procedures
         13.2.3 Security Compliance Checking
         13.2.4 Security Conditions For Connection
         13.2.5 Documented Security Conditions for
                 Users of Network Services
         13.2.6 Incident Handling
   13.3 Identification and Authentication
         13.3.1 Introduction
         13.3.2 Remote Log-in
         13.3.3 Authentication Enhancements
         13.3.4 Remote System Identification
         13.3.5 Secure Single Sign-on
   13.4 Audit Trails
   13.5 Intrusion Detection
   13.6 Protection Against Malicious Code
   13.7 Network Security Management
   13.8 Security Gateways
   13.9 Data Confidentiality Over Networks
   13.10 Data Integrity Over Networks
   13.11 Non-Repudiation
   13.12 Virtual Private Networks
   13.13 Business Continuity/Disaster Recovery
14 DOCUMENT AND REVIEW SECURITY ARCHITECTURE OPTIONS
15 PREPARE FOR THE ALLOCATION OF SAFEGUARD SELECTION,
   DESIGN, IMPLEMENTATION AND MAINTENANCE
16 SUMMARY
Bibliography

Gives guidance with respect to networks and communications to those responsible for the management of IT security.

DocumentType
Technical Report
Pages
42
PublisherName
Canadian Standards Association
Status
Withdrawn

Standards Relationship
ISO/IEC TR 13335-5:2001 Identical

ISO/IEC 7498-3:1997 Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
ISO/IEC TR 15947:2002 Information technology Security techniques IT intrusion detection framework
ISO/IEC TR 13335-2:1997 Information technology Guidelines for the management of IT Security Part 2: Managing and planning IT Security
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC TR 13335-3:1998 Information technology Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security
ISO/IEC TR 13335-4:2000 Information technology Guidelines for the management of IT Security Part 4: Selection of safeguards
ISO/IEC 7498-4:1989 Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework
ISO/IEC TR 13335-1:1996 Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.