
【国际标准】 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
本网站 发布时间:
2025-02-18
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>

适用范围:
暂无
标准号:
ISO/IEC 27033-2:2012 EN
标准名称:
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
英文名称:
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security标准状态:
现行-
发布日期:
2012-07-27 -
实施日期:
出版语种:
EN
- 其它标准
- 上一篇: ISO/IEC 27033-2:2012 EN 23d77740 Information technology -- Security techniques -- Network security -- Part 2: Guidelines for the design and implementation of network security
- 下一篇: ISO/IEC 27033-3:2010 EN 4e3d85e0 Information technology -- Security techniques -- Network security -- Part 3: Reference networking scenarios -- Threats, design techniques and control issues
- 推荐标准
- ISO/TR 23249:2022 EN cde6735a Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management
- ISO/TR 6039:2023 EN e3a81731 Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems
- ISO/TR 6277:2024 EN 58a454e8 Blockchain and distributed ledger technologies — Data flow models for blockchain and DLT use cases
- ISO/TS 23258:2021 EN 2da5874d Blockchain and distributed ledger technologies — Taxonomy and Ontology
- ISO/TS 23635:2022 EN bddb24ca Blockchain and distributed ledger technologies — Guidelines for governance
- IEC 62443-3-2:2020 EN d294ffd6 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-3-2:2020 EN-FR 84209ce0 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-4-2:2019 EN-FR 793760b3 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
- ISO/IEC 15816:2002 EN ade03166 Information technology — Security techniques — Security information objects for access control
- ISO/IEC 15945:2002 EN cc833e91 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
- ISO/IEC 15946-1:2016 EN e8986548 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
- ISO/IEC 15946-5:2017 EN 941deeb5 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
- ISO/IEC 17922:2017 EN ce0d1ad5 Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module
- ISO/IEC 18014-1:2008 EN f75d6cfd Information technology — Security techniques — Time-stamping services — Part 1: Framework
- ISO/IEC 18014-2:2021 EN 78116674 Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens