|
Information technology — Security techniques — Network security —Bog'liq 27033-1-2015v
Introduction
................................................................................................................................................................................................................................
vi
1 Scope
.................................................................................................................................................................................................................................
1
2
Normative references
......................................................................................................................................................................................
1
3
Terms and definitions
.....................................................................................................................................................................................
2
4
Symbols and abbreviated terms
...........................................................................................................................................................
6
5 Structure
.......................................................................................................................................................................................................................
8
6 Overview
....................................................................................................................................................................................................................
10
6.1 Background
.............................................................................................................................................................................................
10
6.2
Network security planning and management
...........................................................................................................
11
|
| |