Table of Contents - X.1715 (2022) Amd. 1 (04/2024) - Editorial corrections and clarifications
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Introduction 7 Functional elements and information assets 7.1 Functional elements 7.2 Information assets in SSN 8 Security threats 8.1 Eavesdropping 8.2 Spoofing 8.3 Deletion or corruption 8.4 Repudiation 8.5 Denial of service 9 Security requirements and measures 9.1 Security requirements and measures on original data 9.2 Security requirements and measures on share 9.3 Security requirements and measures on SSN control and management information Bibliography
|