الاستراتيجيات التقنية لمكافحة الرسائل الاقتحامية |
 |
تؤكد التوصية ITU-T X.1231 على الاستراتيجيات التقنية لمكافحة الرسائل الاقتحامية، كما تضم الخصائص العامة للرسائل الاقتحامية والأهداف الرئيسية لمكافحة الرسائل الاقتحامية. وعلاوة على ذلك ومع الإقرار بعدم وجود حل وحيد لحل مشكلة الرسائل الاقتحامية، تقدم هذه التوصية أيضاً قائمة مرجعية لتقييم الأدوات الواعدة في مجال مكافحة الرسائل الاقتحامية. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9333 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1230-X.1249: Countering spam |
Approval date: |
2008-04-18 |
Provisional name: | X.csreq |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1231 (04/2008)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 25 (03/2016)
|
ITU-T X.1231 - Supplement on guidance to assist in countering spam for mobile phone developers
|
In force
|
here
|
here
|
here
|
X Suppl. 33 (09/2018)
|
ITU-T X.1231 - Supplement on technical framework for countering telephone service scams
|
In force
|
here
|
here
|
here
|
X Suppl. 37 (09/2022)
|
ITU-T X.1231 – Supplement on countering spam based on machine learning
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|