ГОСТ Р ИСО/МЭК 27033-1—2011
Библиография
[7] ISO 11166-2
[8] ISO 11568 (all parts)
(1) ISO/IES 7498-1:1994
Information technology — Open Systems Interconnection — Basic Reference Model: The
Basic Model
[2] ISO 7498-2:1989
Information processing systems
—
Open Systems Interconnection — Basic Reference
Model— Security Architecture
[3] ISO/IEC 7498-3:1997
Information technology
—
Open Systems Interconnection — Basic Reference Model:
Naming and Addressing
[4] ISO/IEC 7498-4.1989
Information processing systems
—
Open Systems Interconnection — Basic Reference
Model— Management Framework
[5] ISO/IEC 9594-8
Information technology — Open Systems Interconnection — The Directory: Public key and
attribute certificate trameworks
[6] ISO/IEC 10181-1:1996
Information technology
—
Open Systems Interconnection — Security frameworks for open
systems: Overview
Banking — Key management by means of asymmetnc algorithms — Part 2: Approved
algorithms using the RSA cryptosystem
Banking — Key management (retail)
[9] ISO 11649
Financial
services
—
Core banking — Structured creditor reference to remittance
information
(10) ISO/IEC 11770 (all parts)
Information technology — Security techniques — Key management
(11) ISO/IEC 11889-1
Information technology — Trusted Platform Module — Part 1: Overview
(12) ISO/IEC 11889-2
(13) ISO/IEC 11889-3
Information technology —
Trusted
Platform Module — Part 2: Design principles
Information technology — Trusted Platform Module — Part
3 :
Structures
Banking Public Key Infrastructure
Societal security — Guidelines for incident preparedness and operational continuity
management
December 1994
(14J ISO/IEC 11889-4
Information technology — Trusted Platform Module — Part 4: Commands
(15) ISO 13492
Financial services — Key management related data element — Application and usage of
ISO 8583 data elements
53
and 96
(16) ISO/IEC 13888 (all parts)
Information technology — Security techniques — Non-repudiation
(17) ISO/IEC TR 14516:1999
Information technology — Security techniques — Guidelines for the use and Management
of
Trusted
Third Party services
(18) ISO/IEC 15288:2008
Systems and software engineering
—
System Itfe cucle processes
(19) ISO/IEC 18043:2006
Information technology — Security techniques — Selection, deployment and operations of
intrusion detection systems (IDS)
(20) ISO/IEC TR 18044;2004,>/nformat/on
technology — Secuntytechniques — Informationsecurity
/лс/denf
management
(21) ISO 21188г|
(22) ISO/PAS 22399:2007
(23) ISO/IEC 27003
Information technology — Secunty techniques— Information security management
systems implementation guidance
(24) ISO/IEC 27004
Information technology — Security techniques — Information security management —
Measurement
(25) IETF
Site Security Handbook (RFC 2196). September 1997
(26) IETF
IP Security Document Roadmap (RFC 2411). November 1998
(27) IETF Secunty
Architecture for the Internet Protocol (RFC 2401), November 1998
(28) IETF
Address Allocation for Private Internets (RFC 1918). February 1996
(29) IETF
S N M P S e c u r it y P r o t o c o ls ( R F C 1 3 5 2 ) . J u ly 1 9 9 2
(30) IETF
Internet Security Glossary (RFC 2828). May 2000
(31) IETF
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing (RFC
2827). May 2000
(32) NIST
Special Publications (800 series) On Computer Security
(33) NIST
Special Publication
800-10:
Keeping Your Site Comfortably Secure: An Inroduction to Internet Firewalls.
ISO/IEC TR 18044 будет отменен и заменен новой редакцией ISO/IEC 27035.
J ‘
В тексте ISO указан ISO/IEC 21118
( I n f o r m a t io n t o b e
/лс/uded
in s p e c if ic a t io n s h e e t s — D a t a p r o je c t o r s ) —
это
опечатка.
64