References
- ISO/IEC JTC 1 홈페이지, http://www.iso.org/iso/jtc1_home.html
- ISO/IEC JTC 1 SC 27 홈페이지, http://www.iso.org/iso/iso_technical_committee?commid=45306
- ISO/IEC JTC 1 SC27 N9084, Resolutions of the 9th SC 27 WG 4 Plenary Meeting held in Berlin, Germany from 4 - 8 Oct. 2010.
- ISO/IEC JTC 1/SC 27 N9085, ISO/IEC JTC 1/SC 27/WG 4 Meeting No. 9 Berlin, Germany October 4-8, 2010 Meeting Report
- Walter Fumy, "ISO/IEC JTC1/SC27-IT Security Technique", ITU-T Workshop, Geneva Swiss, 6-7 Dec. 2010.
- ISO/IEC 2nd CD 27032 -Information technology - Security techniques - Guidelines for Cybersecurity (N7917), Dec. 2010.
- ISO/IEC 27033-1 - Information technology - Security techniques -- Network security - Part 1: Part 1: Guidelines for network security
- ISO/IEC FCD 27033-2 - Information technology - Security techniques -- Network security - Part 2: Guidelines for the design and implementation of network security (N8626), Dec. 2010
- ISO/IEC 27033-3 - Information technology - Security techniques --Network security - Part 3: Part 3: Reference networking scenarios - Threats, design, technologies and control issues
- ISO/IEC 2nd WD 27033-4 - Information technology - Security techniques -- Network security -- Part 4: Securing Communications between networks using security gateways (N8634), Dec. 2010
- ISO/IEC WD 27033-5 - Information technology - Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs) (N8647), Dec. 2010.
- ISO/IEC WD 27033-6 - Information technology - Security techniques - Network security - Part 6: Securing IP Network Access using Wireless (N8647), Dec. 2010
- ISO/IEC FCD 27034-1 - Information technology - Security techniques -- Application security - Part 1: Overview and concepts, Dec. 2010
- ISO/IEC 2nd WD 27034-2 - Information technology - Security techniques - Application security - Part 2: Organisation Normative Framework, Dec. 2010
- ISO/IEC FCD 27035 - Information technology - Security techniques - Information Security Incident Management, Dec. 2010
- ISO/IEC WD 27036-1 - Information technology - Security techniques - Information security for supplier relationships - Part 1: Overview and Concepts, Dec. 2010
- ISO/IEC WD 27036-2 - Information technology - Security techniques - Information security for supplier relationships - Part 2: Common Requirements, Dec. 2010
- ISO/IEC 27036-3 - Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for ICT Supply Chain, Dec. 2010.
- ISO/IEC 3rd WD 27037 - Information technology - Security techniques - Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence, Dec. 2010.
- ISO/IEC WD 27038 - Information technology - Security techniques - Specifications for Digital Redaction, Dec. 2010
- SO/IEC WD 27039 (18043) - Information technology - Security techniques - Selection, deployment, and operation of intrusion detection and prevention systems (IDPS), Dec. 2010
- 염흥열, "제9회 네트워크 및 응용보안(SC 27 WG 4) 회의," TTA 저널, No.132, TTA, 2010. 11월