CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations   
 5     Conventions     
 6     Introduction      
 7     Cybersecurity   
        7.1     What is cybersecurity?       
        7.2     Nature of enterprise cybersecurity environment       
        7.3     Threats to cybersecurity and a methodology to address them          
        7.4     End-to-end communications security          
 8     Possible network protection strategies      
        8.1     Closed loop policy management     
        8.2     Uniform access management          
        8.3     Secure communications      
        8.4     Variable depth security      
        8.5     Securing management        
        8.6     Layered security across the application, network and network management
        8.7     Network survivability even under attack     
Appendix I – Attackers techniques     
        I.1        Taxonomy of security threats        
        I.2        Security threats    
Appendix II – Fields of cybersecurity technologies     
       II.1     Cryptography         
       II.2     Access control technologies
       II.3     Antivirus and system integrity          
       II.4     Audit and monitoring          
       II.5     Management          
Appendix III – Example of network security     
      III.1     Securing remote access      
      III.2     Securing IP telephony        
      III.3     Securing the remote office  
      III.4     Securing WLAN    
Bibliography