INCITS/ISO/IEC 18028-2 : 2008
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 2: NETWORK SECURITY ARCHITECTURE
23-07-2013
01-01-2008
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Reference Architecture for network security
6 Security Dimensions
6.1 Access Control Security Dimension
6.2 Authentication Security Dimension
6.3 Non-repudiation Security Dimension
6.4 Data Confidentiality Security Dimension
6.5 Communication Flow Security Dimension
6.6 Data Integrity Security Dimension
6.7 Availability Security Dimension
6.8 Privacy Security Dimension
7 Security Layers
7.1 The Infrastructure Security Layer
7.2 The Services Security Layer
7.3 The Applications Security Layer
8 Security Planes
8.1 The Management Security Plane
8.2 The Control Security Plane
8.3 The End-User Security Plane
9 Security threats
10 Description of the objectives achieved by application
of Security Dimensions to Security Layers
10.1 Infrastructure Security Layer
10.2 Services Security Layer
10.3 Applications Security Layer
Bibliography
Specifies a network security architecture for providing end-to-end network security.
Committee |
CS1
|
DocumentType |
Standard
|
PublisherName |
Information Technology Industry Council
|
Status |
Withdrawn
|
Supersedes |
Standards | Relationship |
ISO/IEC 18028-2:2006 | Identical |
ISO/IEC 18028-1:2006 | Information technology Security techniques IT network security Part 1: Network security management |
ISO/IEC 18028-4:2005 | Information technology Security techniques IT network security Part 4: Securing remote access |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.