Security requirements and countermeasures for targeted email attacks |
|
Recommendation ITU-T X.1236 specifies requirements for security features to block inbound and outbound email attacks in the form of multilevel management that includes countermeasures against targeted email attacks. This approach is necessary to integrate or deploy a new framework to improve Internet user defence against such attacks. Recommendation ITU-T X.1236 forms a reference on the direction and objectives of designing an email security diagnostic framework or developing email security solutions with those security functional requirements for information technology (IT) security managers, especially in those countries beginning to be actively engaged in IT development and implementation.
Targeted email attacks are designed to damage or compromise information assets of an entity by establishing a connection with the targets after gathering sufficient resources to conduct an attack and then enticing them to take certain actions that eventually create a security loophole. These targeted attacks used in inbound and outbound emails are evolving into more sophisticated and unknown types, such as using unknown malicious files or capitalizing on the target's social relationships. However, so far there are no security requirements proposed to effectively prevent or block them.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/15710 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1230-X.1249: Countering spam |
Approval date: |
2023-11-13 |
Provisional name: | X.sr-ctea |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1236 (11/2023)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|