• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

TR 103 456 : 1.1.1

Current

Current

The latest, up-to-date edition.

CYBER; IMPLEMENTATION OF THE NETWORK AND INFORMATION SECURITY (NIS) DIRECTIVE

Published date

14-11-2017

Sorry this product is not available in your region.

Intellectual Property Rights
Foreword
Modal verbs terminology
Executive summary
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Overview of the NIS Directive
5 Cyber threat intelligence sharing - incidents and risks
6 Role of risk analysis in protecting NIS
7 Challenges and solutions
8 Recommendations
Annex A - Historical development of cyber
          threat intelligence sharing
History

Gives guidance in accordance with the Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union (commonly called the NIS Directive or NISD) on the available technical specifications and those in development by major cyber security communities worldwide designed to meet the legal measures and technical requirements relating to the sharing of information on network based risks and incidents and also the necessary defence measures to enable the protection of its essential security interests.

Committee
CYBER
DocumentType
Standard
PublisherName
European Telecommunications Standards Institute
Status
Current

TR 103 421 : 1.1.1 CYBER; NETWORK GATEWAY CYBER DEFENCE

TR 103 303 : 1.1.1 CYBER; PROTECTION MEASURES FOR ICT IN THE CONTEXT OF CRITICAL INFRASTRUCTURE
TR 103 331 : 1.1.1 CYBER; STRUCTURED THREAT INFORMATION SHARING
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
ETR 340 : 20001 TELECOMMUNICATIONS SECURITY
TR 103 421 : 1.1.1 CYBER; NETWORK GATEWAY CYBER DEFENCE
TR 103 305 : 1.1.1 CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE
TR 103 305-4 : 1.1.1 CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE; PART 4: FACILITATION MECHANISMS

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.