TR 103 305-1 : 2.1.1
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE; PART 1: THE CRITICAL SECURITY CONTROLS
02-10-2018
10-10-2016
Intellectual Property Rights
Foreword
Modal verbs terminology
Executive summary
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Critical Security Controls
Annex A - Evolving An Attack Model for the
Critical Security Controls
Annex B - Attack Types
History
Describes a specific set of technical measures available to detect, prevent, respond, and mitigate damage from the most common to the most advanced of cyber attacks.
Committee |
CYBER
|
DocumentType |
Standard
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Superseded
|
SupersededBy |
TR 103 305-3 : 1.1.1 | CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE; PART 3: SERVICE SECTOR IMPLEMENTATIONS |
TR 103 305-2 : 1.1.1 | CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE; PART 2: MEASUREMENT AND AUDITING |
TR 103 305-4 : 1.1.1 | CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE; PART 4: FACILITATION MECHANISMS |
IEEE 802.1X-2010 | IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control |
TR 103 305-2 : 1.1.1 | CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE; PART 2: MEASUREMENT AND AUDITING |
TR 103 305 : 1.1.1 | CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.