Group 17 has initiated the approval process for a standard providing an
overview of cybersecurity. The work establishes a definition of cybersecurity
that is wide enough in scope to cover various and sometimes inconsistent
The Recommendation (X.1205)
provides a taxonomy of security threats from an organizationís point of view.
Cybersecurity threats and vulnerabilities including the most common hackerís
tools of the trade are presented. Threats are discussed at various network layers.
Cybersecurity technologies to remedy threats are discussed including: routers,
firewalls, antivirus protection, intrusion detection systems, intrusion
protection systems, secure computing and audit and monitoring. Network
protection principles such as defense in depth, access management with
application to Cybersecurity are also discussed. Risk management strategies and
techniques are discussed including the value of training and education in
protecting the network. In addition examples for securing various networks
based on the discussed technologies are also discussed.