12.07.2015 Views

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ISO</strong>/<strong>IEC</strong><strong>18028</strong>-1:2006(E)ContentsPageForeword............................................................................................................................................. vIntroduction.........................................................................................................................................vi1 Scope ....................................................................................................................................... 12 Normative references................................................................................................................ 13 Terms and definitions ............................................................................................................... 23.1 Terms defined in other International Standards ......................................................................... 23.2 Terms defined in this part of <strong>ISO</strong>/<strong>IEC</strong> <strong>18028</strong>............................................................................... 24 Abbreviated terms .................................................................................................................... 75 Structure................................................................................................................................... 96 Aim......................................................................................................................................... 107 Overview................................................................................................................................. 107.1 Background ............................................................................................................................ 107.2 Identification Process............................................................................................................. 128 Consider Corporate Information Security Policy Requirements............................................... 159 Review Network Architectures and Applications...................................................................... 159.1 Background ............................................................................................................................ 159.2 Types of Network.................................................................................................................... 169.3 Network Protocols................................................................................................................... 169.4 Networked Applications .......................................................................................................... 179.5 Technologies Used to Implement Networks............................................................................. 179.5.1 Local Area Networks............................................................................................................... 179.5.2 Wide Area Networks ............................................................................................................... 189.6 Other Considerations.............................................................................................................. 1810 Identify Types of Network Connection ..................................................................................... 1811 Review Networking Characteristics and Related Trust Relationships....................................... 2011.1 Network Characteristics .......................................................................................................... 2011.2 Trust Relationships................................................................................................................. 2012 Identify the Information Security Risks .................................................................................... 2213 Identify Appropriate Potential Control Areas............................................................................ 2713.1 Background............................................................................................................................. 2713.2 Network Security Architecture ................................................................................................. 2713.2.1 Preface....................................................................................................................................2713.2.2 Local Area Networking ............................................................................................................2913.2.3 Wide Area Networking.............................................................................................................3113.2.4 Wireless Networks ..................................................................................................................3213.2.5 Radio Networks.......................................................................................................................3313.2.6 Broadband Networking............................................................................................................3513.2.7 Security Gateways ..................................................................................................................3613.2.8 Remote Access Services.........................................................................................................3713.2.9 Virtual Private Networks..........................................................................................................3813.2.10 IP Convergence (data, voice, video) .........................................................................................3913.2.11 Enabling Access to Services Provided by Networks that are External (to the Organization)......4113.2.12 Web Hosting Architecture........................................................................................................4213.3 Secure Service Management Framework.................................................................................. 4413.3.1 Management Activities ............................................................................................................44© <strong>ISO</strong>/<strong>IEC</strong> 2006 - All rights reserved III

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!