Temporary Documents
(PLEN)
[ AI/Question: Q4/17 ]  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 657-PLEN ]
(Rev.1) |
LS/o/r on Referencing 3 new ETSI ISG ISI specifications in the list of CYBEX techniques
|
ITU-T Study Group 17
|
Q4/17
|
2013-09-02 |
|
[ 656-PLEN ]
(Rev.1-2) |
LS/o/r on submission of OASIS CAP v1.2
|
ITU-T Study Group 17
|
Q4/17, Q11/17
|
2013-09-02 |
|
[ 654-PLEN ]
|
A.5 justification information for draft new Recommendation ITU-T X.maec
|
Rapporteur Q4/17
|
Q4/17
|
2013-09-02 |
|
[ 614-PLEN ]
|
Suggested update to the CYBEX webpage and NFVO webpage
|
Rapporteur Q4/17 (Cybersecurity)
|
Q4/17
|
2013-08-30 |
|
[ 606-PLEN ]
|
Joint meeting of Q1/17 and Q4/17 on terms and definitions
|
Rapporteur Q4/17
|
Q4/17, Q1/17
|
2013-08-30 |
|
[ 589-PLEN ]
(Rev.1-3) |
The 9th revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of source based security troubleshooting mechanisms for Internet Protocol-based networks
|
X.trm Editors
|
Q4/17
|
2013-08-29 |
|
[ 587-PLEN ]
|
Recommendation X.1500 (2011) Amendment 4, Overview of cybersecurity information exchange (CYBEX), (for approval)
|
Rapporteur Q4/17
|
Q4/17
|
2013-08-28 |
|
[ 583-PLEN ]
(Rev.1-2) |
Baseline text for draft Recommendation X.cap, Common Alerting Protocol 1.2
|
Rapporteur Q4/17
|
Q4/17
|
2013-08-28 |
|
[ 582-PLEN ]
|
Agenda for Question 3/17 and Q10/17 joint meeting
|
Q3/17 and Q10/17 Rapporteur
|
Q4/17, Q3/17
|
2013-08-28 |
|
[ 576-PLEN ]
|
Q4/17 comments to Contribution 116, NWI proposal on "Interaction of the IP-based National security center of the public telecommunications network with the security management systems of national operators for developing countries"
|
Rapporteur Q4/17
|
Q4/17
|
2013-08-27 |
|
[ 575-PLEN ]
|
LS/i on Text 2nd WD 27044 - Text for ISO/IEC 2nd WD 27044, Information technology - Security techniques - Guidelines for security information and event management (SIEM) [N12677 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q4/17, Q3/17
|
2013-08-27 |
|
[ 573-PLEN ]
|
Draft Recommendation ITU-T X.maec, Malware attribute enumeration and characterization (for determination)
|
Q4/17 Rapporteur
|
Q4/17
|
2013-08-27 |
|
[ 568-PLEN ]
|
Agenda for Q3/17 and Q4/17 joint meeting
|
Q3/17 and Q4/17 Rapporteur
|
Q4/17, Q3/17
|
2013-08-27 |
|
[ 566-PLEN ]
|
Initial allocation of Liaison Statements from ISO/IEC JTC1/SC27 to Question(s)
|
Vice-Chairman SG17, Liaison officer SC27
|
QALL/17, Q8/17, Q4/17, Q3/17, Q2/17, Q11/17, Q10/17, Q1/17
|
2013-08-26 |
|
[ 560-PLEN ]
|
Japan's answer to the TAP consultation on draft new Recommendation X.1208 "Guideline for cybersecurity index." - TSB Circular 24
|
TSB
|
Q4/17, (QALL/17)
|
2013-08-13 |
|
[ 549-PLEN ]
|
Introduction to 3rd Cyber Space conference, Seoul, 17 - 18 October 2013
|
SG17 Vice chairman
|
Q4/17, (QALL/17)
|
2013-07-22 |
|
[ 548-PLEN ]
(Rev.1) |
ITU-T Recommendations referencing withdrawn ISO/IEC standards
|
TSB
|
Q9/17, Q6/17, Q4/17, Q3/17, Q2/17, Q11/17, Q1/17, (QALL/17)
|
2013-07-22 |
|
[ 545-PLEN ]
|
LS/i on ISO/IEC 2nd CD 27043 - Information technology -- Security techniques - Incident investigation principles and processes [N12687 from ISO/IEC JTC 1/SC27
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 543-PLEN ]
|
LS/i on 3rd WD 27035-3 - Text for ISO/IEC 3rd WD 27035-3, - Security techniques - Information security incident management - Part 3: Guidelines for incident response operations [N12672 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 542-PLEN ]
|
LS/i on 3rd WD 27035-2 - Text for ISO/IEC 3rd WD 27035-2, Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response [N12670 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 541-PLEN ]
|
LS/i on 3rd WD 27035-1 - Text for ISO/IEC 3rd WD 27035-1, Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management [N12668 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 539-PLEN ]
|
LS/i on Text for ISO/IEC DIS 27039 - Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) [N12689 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 538-PLEN ]
|
LS/i on ISO/IEC 2nd CD 27042 - Information technology -- Security techniques - Guidelines for the analysis and interpretation of digital evidence [N12685 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 537-PLEN ]
|
LS/i on ISO/IEC CD 27041 - Information technology -- Security techniques - Guidance on assuring suitability and adequacy of incident investigation methods [N12683 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 534-PLEN ]
|
LS/i on Liaison Statement to ITU-T SG 17 [N12518 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
WP1/17, Q9/17, Q8/17, Q4/17, Q10/17, Q1/17, (QALL/17), (Q3/17)
|
2013-07-22 |
|
[ 527-PLEN ]
(Rev.1) |
Draft revised Recommendation ITU-T X.1526 (X.oval), Open vulnerability and assessment language (for determination)
|
Q4/17 Rapporteur
|
Q4/17
|
2013-07-15 |
|
[ 526-PLEN ]
(Rev.1) |
Draft revised Recommendation ITU-T X.1520 (X.cve), Common vulnerabilities and exposures (for determination)
|
Q4/17 Rapporteur
|
Q4/17
|
2013-07-15 |
|
[ 525-PLEN ]
|
Draft Recommendation ITU-T X.maec, Malware attribute enumeration and characterization (for determination)
|
Q4/17 Rapporteur
|
Q4/17
|
2013-07-15 |
|
[ 523-PLEN ]
(Rev.1) |
Tutorial: ETSI ISG ISI Standardization
|
SG17 Chairman
|
Q4/17, Q3/17, (QALL/17)
|
2013-07-08 |
|
[ 522-PLEN ]
|
LS/o on ISI Indicators and ISI Event Model [to ETSI ISG ISI]
|
ITU-T SG17 Question 4 (2-3 July 2013, virtual)
|
Q4/17, Q3/17
|
2013-07-05 |
|
[ 514-PLEN ]
|
LS/i/r on Referencing 3 new ETSI ISG ISI specifications in the list of CYBEX techniques [from ETSI ISG ISI]
|
ETSI ISG ISI chairman
|
Q4/17
|
2013-06-25 |
|
[ 512-PLEN ]
|
Maintenance responsibility of SG17 webpages
|
TSB
|
Q4/17, Q12/17, Q11/17, Q10/17, Q1/17
|
2013-06-18 |
|
[ 509-PLEN ]
|
Highlights of the June 2013 Review Committee meeting of significance to SG17
|
TSB
|
Q9/17, Q8/17, Q6/17, Q5/17, Q4/17, Q3/17, Q2/17, Q1/17
|
2013-06-27 |
|
[ 501-PLEN ]
|
TSB edits to: The 9th revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks (for determination)
|
TSB
|
Q4/17
|
2013-05-10 |
|
[ 499-PLEN ]
|
TSB edits to: Draft Recommendation ITU-T X.maec, Malware attribute enumeration and characterization
|
TSB
|
Q4/17
|
2013-07-15 |
|
[ 496-PLEN ]
(Rev.1) |
Enhancing cybersecurity in least developed countries
|
TSB
|
QALL/17, Q4/17
|
2013-08-23 |
|
[ 490-PLEN ]
(Rev.1) |
List of proposed new work items for SG17 and list of work items to be deleted/modified
|
TSB
|
Q7/17, Q6/17, Q4/17, Q11/17, Q10/17, (QALL/17)
|
2013-08-15 |
|
[ 485-PLEN ]
|
Highlights of the June 2013 TSAG meeting as of significance to SG17
|
TSB
|
Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17, Q2/17Q3/17, Q1/17
|
2013-07-04 |
|
[ 481-PLEN ]
|
Reply results to TSB Circular
|
TSB
|
QALL/17, Q4/17, (Q10/17)
|
2013-08-16 |
|
[ 466-PLEN ]
(Rev.1) |
Outcome of GSC-17 of interest to SG17
|
TSB
|
Q9/17, Q8/17, Q6/17, Q4/17, Q3/17, Q10/17, (QALL/17)
|
2013-05-23 |
|
[ 456-PLEN ]
|
LS/i on submission of OASIS CAP v1.2 [to ITU-T SG17]
|
OASIS
|
Q4/17, (Q11/17)
|
2013-05-10 |
|
[ 455-PLEN ]
|
Communication from ETSI ISG ISI chairman to SG17 on ETSI ISG ISI specifications
|
TSB
|
Q4/17
|
2013-05-10 |
|
[ 444-PLEN ]
|
Summaries of Recommendations under development in Q4/17
|
Rapporteur Q4/17
|
Q4/17
|
2013-05-09 |
|
[ 440-PLEN ]
|
Outcome of Emergency Alerting Policy Workshop, 23-24 April 2013, Geneva/Switzerland
|
TSB
|
Q4/17
|
2013-07-22 |
|
[ 434-PLEN ]
|
Report of Q4/17 interim Rapporteur meeting (2-3 July 2013)
|
Rapporteur Q4/17 (Cybersecurity)
|
Q4/17
|
2013-05-09 |
|
[ 430-PLEN ]
(Rev.1-2) |
Report of special session on revision of Question texts (MON 26 August 2013, 18:00 - 19:30)
|
SG17
|
Qall/17, Q6/17, Q4/17, Q3/17, Q11/17
|
2013-05-09 |
|
[ 422-PLEN ]
(Rev.1) |
WP2/17 report
|
WP2/17 chairman
|
Q5/17, Q4/17
|
2013-05-09 |
|
[ 415-PLEN ]
|
Report of the Correspondence Group on Cybersecurity Information Exchange Capabilities (CG-CYBEX), Apr - Aug 2013
|
Convenor, CYBEX Correspondence Group
|
Q4/17
|
2013-07-15 |
|
[ 404-PLEN ]
(Rev.1-2) |
Report of Q4/17
|
Rapporteur Q4/17
|
Q4/17
|
2013-05-09 |
|
[ 399-PLEN ]
|
The 8th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
X.eipwa Editors
|
Q4/17
|
2013-05-09 |
Results:55 total items. Result page:
1 -
2
- Next

|
Multiple Document Download: Formats and Languages to be included (when available):