<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    參考文獻

    參考文獻

    [1] ISO/IEC 20000 (all parts), Information technology —** Service management

    [2] ISO/IEC 27001|GB/T 22080 信息技術 安全技術 信息安全管理體系 要求(Information technology Security techniques Information security management systems Requirements**)

    [3] ISO/IEC 27002|GB/T 22081 信息技術 安全技術 信息安全控制實踐指南(Information technology Security techniques Code of practice for information security controls**)

    [4] ISO/IEC 27003|GB/T 31496 信息技術 安全技術 信息安全管理體系實施指南(Information technology Security techniques Information security management system implementation guidance**)

    [5] ISO/IEC 27004|GB/T 31497* 信息技術 安全技術 信息安全管理 測量(Information technology Security techniques Information security management Measurement*)

    [6] ISO/IEC 27005|GB/T 31722 信息技術 安全技術 信息安全風險管理(Information technology Security techniques Information security risk management**)

    [7] ISO/IEC 27010|GB/T 32920 信息技術 安全技術 行業間和組織間通信的信息安全管理(Information technology Security techniques Information security management for inter-sector and inter-organizational communications**)

    [8] ISO/IEC 27031, Information technology —** Security techniques Guidelines for information and communication technology readiness for business continuity

    [9] ISO/IEC 27033-1, Information technology —** Security techniques Network security Part 1: Overview and concepts

    [10] ISO/IEC 27033-2, Information technology —** Security techniques Network security Part 2: Guidelines for the design and implementation of network security

    [11] ISO/IEC TS 27033-3, Information technology —** Security techniques Network security Part 3: Reference networking scenarios Threats, design techniques and control issues

    [12] ISO/IEC 27037, Information technology —** Security techniques Guidelines for identification, collection, acquisition and preservation of digital evidence

    [13] ISO/IEC 27039, Information technology —** Security techniques Selection, deployment and operations of intrusion detection systems (IDPS)

    [14] ISO/IEC 27041, Information technology —** Security techniques Guidance on assuring suitability and adequacy of incident investigative method

    [15] ISO/IEC 27042, Information technology —** Security techniques Guidelines for the analysis and interpretation of digital evidence

    [16] ISO/IEC 27043, Information technology —** Security techniques Incident investigation principles and processes

    [17] ISO/IEC 29147, Information technology —** Security techniques Vulnerability disclosure

    [18] ISO/IEC 30111, Information technology —** Security techniques Vulnerability handling processes

    本文章首發在 網安wangan.com 網站上。

    上一篇 下一篇
    討論數量: 0
    只看當前版本


    暫無話題~
    亚洲 欧美 自拍 唯美 另类