ETSI TR 103 305-1 V2.1.1 (2016-08)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
CYBER; Critical Security Controls for Effective Cyber Defence; Part 1: The Critical Security Controls
Hardcopy , PDF
English
01-08-2016
02-10-2018
Intellectual Property Rights
Foreword
Modal verbs terminology
Executive summary
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Critical Security Controls
Annex A - Evolving An Attack Model for the
Critical Security Controls
Annex B - Attack Types
History
Describes a specific set of technical measures available to detect, prevent, respond, and mitigate damage from the most common to the most advanced of cyber attacks.
| DocumentType |
Technical Report
|
| Pages |
50
|
| PublisherName |
European Telecommunications Standards Institute
|
| Status |
Superseded
|
| SupersededBy |
| ETSI TR 103 305-3 V1.1.1 (2016-08) | CYBER; Critical Security Controls for Effective Cyber Defence; Part 3: Service Sector Implementations |
| ETSI TR 103 305-2 V1.1.1 (2016-08) | CYBER; Critical Security Controls for Effective Cyber Defence; Part 2: Measurement and auditing |
| IEEE 802.1X-2010 | IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control |
| ETSI TR 103 305-2 V1.1.1 (2016-08) | CYBER; Critical Security Controls for Effective Cyber Defence; Part 2: Measurement and auditing |
| ETSI TR 103 305 V1.1.1 (2015-05) | CYBER; Critical Security Controls for Effective Cyber Defence |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.