• There are no items in your cart

INCITS/ISO/IEC 18028-2 : 2008

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 2: NETWORK SECURITY ARCHITECTURE

Withdrawn date

07-23-2013

Published date

01-01-2008

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Reference Architecture for network security
6 Security Dimensions
   6.1 Access Control Security Dimension
   6.2 Authentication Security Dimension
   6.3 Non-repudiation Security Dimension
   6.4 Data Confidentiality Security Dimension
   6.5 Communication Flow Security Dimension
   6.6 Data Integrity Security Dimension
   6.7 Availability Security Dimension
   6.8 Privacy Security Dimension
7 Security Layers
   7.1 The Infrastructure Security Layer
   7.2 The Services Security Layer
   7.3 The Applications Security Layer
8 Security Planes
   8.1 The Management Security Plane
   8.2 The Control Security Plane
   8.3 The End-User Security Plane
9 Security threats
10 Description of the objectives achieved by application
   of Security Dimensions to Security Layers
   10.1 Infrastructure Security Layer
   10.2 Services Security Layer
   10.3 Applications Security Layer
Bibliography

Specifies a network security architecture for providing end-to-end network security.

Committee
CS1
DocumentType
Standard
PublisherName
Information Technology Industry Council
Status
Withdrawn
Supersedes

Standards Relationship
ISO/IEC 18028-2:2006 Identical

ISO/IEC 18028-1:2006 Information technology Security techniques IT network security Part 1: Network security management
ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.