Overview of cybersecurity |
 |
Recommendation ITU-T X.1205 provides a definition for cybersecurity. This Recommendation provides a taxonomy of the security threats from an organization point of view. Cybersecurity threats and vulnerabilities including the most common hacker's tools of the trade are presented. Threats are discussed at various network layers.Various cybersecurity technologies that are available to remedy the threats are discussed, including: routers, firewalls, antivirus protection, intrusion detection systems, intrusion protection systems, secure computing and audit and monitoring. Network protection principles, such as defence in depth, access management with application to cybersecurity are discussed. Risk management strategies and techniques are discussed including the value of training and education in protecting the network. Examples for securing various networks, based on the discussed technologies, are also discussed. |
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1205 (04/2008)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 8 (12/2010)
|
ITU-T X.1205 – Supplement on best practices against botnet threats
|
In force
|
here
|
here
|
here
|
X Suppl. 9 (09/2011)
|
ITU-T X.1205 – Supplement on guidelines for reducing malware in ICT networks
|
In force
|
here
|
here
|
here
|
X Suppl. 10 (01/2014)
|
ITU-T X.1205 – Supplement on usability of network traceback
|
In force
|
here
|
here
|
here
|
X Suppl. 18 (04/2013)
|
ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based telecommunication networks
|
In force
|
here
|
here
|
here
|
X Suppl. 20 (04/2013)
|
ITU-T X.1205 - Supplement on framework of security information sharing negotiation
|
In force
|
here
|
here
|
here
|
X Suppl. 34 (01/2019)
|
ITU-T X.1051 – Supplement on code of practice for information security controls for telecommunication organizations
|
In force
|
here
|
here
|
here
|
|