
【国际标准】 Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
本网站 发布时间:
2025-04-08
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>

适用范围:
暂无
标准号:
ISO/IEC 27033-5:2013 EN
标准名称:
Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
英文名称:
Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)标准状态:
现行-
发布日期:
2013-07-29 -
实施日期:
出版语种:
EN
- 其它标准
- 上一篇: ISO/IEC 27033-5:2013 EN 44ccadac Information technology -- Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
- 下一篇: ISO/IEC 27033-6:2016 EN 61a047e3 Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access
- 推荐标准
- IEC 62443-3-2:2020 EN d294ffd6 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-3-2:2020 EN-FR 84209ce0 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-4-2:2019 EN-FR 793760b3 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
- ISO/IEC 21964-1:2018 EN 7df746cc Information technology — Destruction of data carriers — Part 1: Principles and definitions
- ISO/IEC 21964-1:2018 EN 889c16da Information technology - Destruction of data carriers - Part 1: Principles and definitions
- ISO/IEC 21964-2:2018 EN dd1a551b Information technology — Destruction of data carriers — Part 2: Requirements for equipment for destruction of data carriers
- ISO/IEC 21964-2:2018 EN f1aa3ac1 Information technology - Destruction of data carriers - Part 2: Requirements for equipment for destruction of data carriers
- ISO/IEC 21964-3:2018 EN 3184d2cc Information technology - Destruction of data carriers - Part 3: Process of destruction of data carriers
- ISO/IEC 23264-1:2021 EN 91702f31 Information security - Redaction of authentic data - Part 1: General
- ISO/IEC 23264-2:2024 EN 82415c1d Information security — Redaction of authentic data — Part 2: Redactable signature schemes based on asymmetric mechanisms
- ISO/IEC 23837-2:2023 EN 5b96fefc Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 2: Evaluation and testing methods
- ISO/IEC 24745:2022 EN 71bb9d75 Information security, cybersecurity and privacy protection - Biometric information protection
- ISO/IEC 24745:2022 EN d59ff202 Information security, cybersecurity and privacy protection — Biometric information protection
- ISO/IEC 24759:2025 EN 40ed81d8 Information security, cybersecurity and privacy protection - Test requirements for cryptographic modules
- ISO/IEC 24760-1:2019 EN 1a902ac9 IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts