參考文獻
參考文獻
[1] ISO/IEC 20000 (all parts), Information technology —** Service management
[2] ISO/IEC 27001|GB/T 22080 信息技術 安全技術 信息安全管理體系 要求(Information technology — Security techniques — Information security management systems — Requirements**)
[3] ISO/IEC 27002|GB/T 22081 信息技術 安全技術 信息安全控制實踐指南(Information technology — Security techniques — Code of practice for information security controls**)
[4] ISO/IEC 27003|GB/T 31496 信息技術 安全技術 信息安全管理體系實施指南(Information technology — Security techniques — Information security management system implementation guidance**)
[5] ISO/IEC 27004|GB/T 31497* 信息技術 安全技術 信息安全管理 測量(Information technology — Security techniques — Information security management — Measurement*)
[6] ISO/IEC 27005|GB/T 31722 信息技術 安全技術 信息安全風險管理(Information technology — Security techniques — Information security risk management**)
[7] ISO/IEC 27010|GB/T 32920 信息技術 安全技術 行業間和組織間通信的信息安全管理(Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications**)
[8] ISO/IEC 27031, Information technology —** Security techniques — Guidelines for information and communication technology readiness for business continuity
[9] ISO/IEC 27033-1, Information technology —** Security techniques — Network security — Part 1: Overview and concepts
[10] ISO/IEC 27033-2, Information technology —** Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
[11] ISO/IEC TS 27033-3, Information technology —** Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
[12] ISO/IEC 27037, Information technology —** Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
[13] ISO/IEC 27039, Information technology —** Security techniques — Selection, deployment and operations of intrusion detection systems (IDPS)
[14] ISO/IEC 27041, Information technology —** Security techniques — Guidance on assuring suitability and adequacy of incident investigative method
[15] ISO/IEC 27042, Information technology —** Security techniques — Guidelines for the analysis and interpretation of digital evidence
[16] ISO/IEC 27043, Information technology —** Security techniques — Incident investigation principles and processes
[17] ISO/IEC 29147, Information technology —** Security techniques — Vulnerability disclosure
[18] ISO/IEC 30111, Information technology —** Security techniques — Vulnerability handling processes
GB/T 20985.1—2017 信息技術 安全技術 信息安全事件管理 第1部分:事件管理原理
推薦文章: