معمارية الأمن في الأنظمة التي توفر الاتصالات من طرف إلى طرف |
تحدد التوصية X.805 معمارية أمن شبكات لتوفير أمن شبكات من طرف إلى طرف. ويمكن تطبيق المعمارية بصورة مستقلة عن تكنولوجيا الشبكة الأساسية على مختلف أنواع الشبكات حيث يكون الأمن من طرف إلى طرف هو الشاغل. وتحدد هذه التوصية العناصر المعمارية العامة المتصلة بالأمن والضرورية لتوفير الأمن من طرف إلى طرف. والغرض من هذه التوصية هو أن تكون بمثابة قاعدة أساس لوضع التوصيات المفصلة من أجل أمن الشبكات من طرف إلى طرف. |
|
Citation: |
https://handle.itu.int/11.1002/1000/7024 |
Series title: |
X series: Data networks, open system communications and security X.800-X.849: Security |
Approval date: |
2003-10-29 |
Provisional name: | X.css |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.805 (10/2003)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 2 (09/2007)
|
ITU-T X.800-X.849 series – Supplement on security baseline for network operators
|
In force
|
here
|
here
|
here
|
X Suppl. 3 (04/2008)
|
ITU-T X.800-X.849 series – Supplement on guidelines for implementing system and network security
|
In force
|
here
|
here
|
here
|
X Suppl. 15 (09/2012)
|
ITU-T X.800-X.849 series - Supplement on guidance for creating a national IP-based public network security centre for developing countries
|
In force
|
here
|
here
|
here
|
X Suppl. 16 (09/2012)
|
ITU-T X.800-X.849 series – Supplement on architectural systems for security controls for preventing fraudulent activities in public carrier networks
|
In force
|
here
|
here
|
here
|
X Suppl. 30 (09/2017)
|
ITU-T X.805 – Supplement on security guidelines for mobile virtual network operators
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Security in telecommunications and information technology (7th edition)
|
2020
|
here
|
Security in Telecommunications and Information Technology
|
2015
|
here
|
Security in Telecommunications and Information Technology
|
2011
|
here
|
Security in Telecommunications and Information Technology
|
2004
|
here
|
Security in Telecommunications and Information Technology
|
2003
|
here
|
|