BS ISO/IEC 18028-2:2006
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology. Security techniques. IT network security Network security architecture
Hardcopy , PDF
31-08-2012
English
24-02-2006
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Reference Architecture for network security
6 Security Dimensions
6.1 Access Control Security Dimension
6.2 Authentication Security Dimension
6.3 Non-repudiation Security Dimension
6.4 Data Confidentiality Security Dimension
6.5 Communication Flow Security Dimension
6.6 Data Integrity Security Dimension
6.7 Availability Security Dimension
6.8 Privacy Security Dimension
7 Security Layers
7.1 The Infrastructure Security Layer
7.2 The Services Security Layer
7.3 The Applications Security Layer
8 Security Planes
8.1 The Management Security Plane
8.2 The Control Security Plane
8.3 The End-User Security Plane
9 Security threats
10 Description of the objectives achieved by application
of Security Dimensions to Security Layers
10.1 Infrastructure Security Layer
10.2 Services Security Layer
10.3 Applications Security Layer
Bibliography
Specifies a network security architecture for providing end-to-end network security.
Committee |
IST/33
|
DevelopmentNote |
Supersedes 04/30088075 DC. (03/2006)
|
DocumentType |
Standard
|
Pages |
30
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 18028-2:2006 | Identical |
ISO/IEC 18028-1:2006 | Information technology Security techniques IT network security Part 1: Network security management |
ISO/IEC 18028-4:2005 | Information technology Security techniques IT network security Part 4: Securing remote access |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.