• Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

13/30250756 DC : 0

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

BS ISO/IEC 27039 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS

Available format(s)

Hardcopy , PDF

Superseded date

28-02-2015

Superseded by

BS ISO/IEC 27039:2015

Language(s)

English

£20.00
Excluding VAT

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Background
4 General
5 Selection
6 Deployment
7 Operations
Annex A (Informative) - Intrusion Detection and
        Prevention System (IDPS): Framework and
        issues to be considered
Bibliography

BS ISO/IEC 27039

Committee
IST/33
DocumentType
Draft
Pages
57
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
ISO/IEC 27033-1:2015 Information technology Security techniques Network security Part 1: Overview and concepts
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 27010:2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications
ISO/IEC 27033-2:2012 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
ISO/IEC 18028-5:2006 Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.