Committed to connecting the world

  •  

 

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Keywords search (beta version)
Advanced search
Provisional name
ISO/IEC number
Formal description
Study Groups tree viewExpand Study Groups tree view

ITU-T X.1205 (04/2008)

عربي | 中文 | English | Español | Français | Русский
Overview of cybersecurity
Recommendation ITU-T X.1205 provides a definition for cybersecurity. This Recommendation provides a taxonomy of the security threats from an organization point of view. Cybersecurity threats and vulnerabilities including the most common hacker's tools of the trade are presented. Threats are discussed at various network layers.Various cybersecurity technologies that are available to remedy the threats are discussed, including: routers, firewalls, antivirus protection, intrusion detection systems, intrusion protection systems, secure computing and audit and monitoring. Network protection principles, such as defence in depth, access management with application to cybersecurity are discussed. Risk management strategies and techniques are discussed including the value of training and education in protecting the network. Examples for securing various networks, based on the discussed technologies, are also discussed.
Citation: http://handle.itu.int/11.1002/1000/9136
Approval date: 2008-04-18
Provisional name:X.cso
Approval process:TAP
Status: In force
Maintenance responsibility: ITU-T Study Group 17
Further details: Patent statement(s)
Development history
Ed. ITU-T Recommendation Status Summary Table of Contents Download
1 X.1205 (04/2008) In force
here
here
here