Consideraciones de diseño para la mejor percepción por el usuario extremo de los indicadores de fiabilidad |
 |
Ataques de varios tipos emplean la replicación de contenido de proveedores de servicio fiables, engañando así a los usuarios extremos, que creen en esa falsa fiabilidad.
En la Recomendación UIT-T X.1212 se describen las consideraciones de diseño para la mejor percepción por el usuario extremo de los indicadores de fiabilidad. En los apéndices se describen técnicas representativas para medir la percepción por el usuario extremo de esos indicadores.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/13195 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1200-X.1229: Cybersecurity |
Approval date: |
2017-03-30 |
Provisional name: | X.cogent |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1212 (03/2017)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|