Information technology — Security techniques — Network security —




Download 363,46 Kb.
Pdf ko'rish
bet9/10
Sana12.06.2024
Hajmi363,46 Kb.
#262991
1   2   3   4   5   6   7   8   9   10
Bog'liq
27033-1-2015

 
ISO/IEC 27033-1:2015(E)
It should be noted that this International Standard is not a reference or normative document for regulatory 
and legislative security requirements. Although it emphasizes the importance of these influences, it 
cannot state them specifically, since they are dependent on the country, the type of business, etc.
Unless otherwise stated, throughout this part of ISO/IEC 27033 the guidance referenced is applicable to 
current and/or planned networks, but will only be referenced as “networks” or “the network”.
 
viii
 
© ISO/IEC 2015 – All rights reserved
This is a preview - click here to buy the full publication


 
Information technology — Security techniques — Network 
security —
Part 1: 
Overview and concepts
1 Scope
This part of ISO/IEC 27033 provides an overview of network security and related definitions. It defines 
and describes the concepts associated with, and provides management guidance on, network security. 
(Network security applies to the security of devices, security of management activities related to the 
devices, applications/services, and end-users, in addition to security of the information being transferred 
across the communication links.)
It is relevant to anyone involved in owning, operating or using a network. This includes senior managers 
and other non-technical managers or users, in addition to managers and administrators who have 
specific responsibilities for information security and/or network security, network operation, or who 
are responsible for an organization’s overall security program and security policy development. It is 
also relevant to anyone involved in the planning, design and implementation of the architectural aspects 
of network security.
This part of ISO/IEC 27033 also includes the following:
— provides guidance on how to identify and analyse network security risks and the definition of 
network security requirements based on that analysis,
— provides an overview of the controls that support network technical security architectures and 
related technical controls, as well as those non-technical controls and technical controls that are 
applicable not just to networks,
— introduces how to achieve good quality network technical security architectures, and the risk, 
design and control aspects associated with typical network scenarios and network “technology” 
areas (which are dealt with in detail in subsequent parts of ISO/IEC 27033), and briefly addresses 
the issues associated with implementing and operating network security controls, and the on-going 
monitoring and reviewing of their implementation.
Overall, it provides an overview of this International Standard and a “road map” to all other parts.

Download 363,46 Kb.
1   2   3   4   5   6   7   8   9   10




Download 363,46 Kb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Information technology — Security techniques — Network security —

Download 363,46 Kb.
Pdf ko'rish