1 |
Recommendation ITU-T X.1205 supplement 8, "Supplement on best practices against botnet threats"
|
2 |
Tony Rutkowski, "Application of CYBEX techniques to future networks," SG17 Tutorial.
|
3 |
김미주, "글로벌 사이버보안 정보교류 국제표준화 동향," TTA ICT Standard Weekly 2009-46호.
|
4 |
MITRE, Assessment Results Format.
|
5 |
MITRE, Common Attack Pattern Enumeration and Classification
|
6 |
MITRE, Common Configuration Enumeration
|
7 |
MITRE, Common Event Expression
|
8 |
MITRE, Common Platform Enumeration
|
9 |
MITRE, Common Weakness Enumeration
|
10 |
MITRE, Common Weakness Scoring System.
|
11 |
Electronic Authentication Guideline, NIST Special Publication 800-63 Version 1.0.2, April 2006
|
12 |
CA/Browser Forum, Guidelines for the Issuance and Management of Extended Validation Certificates, Ver. 1.3
|
13 |
Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates, ETSI TS102042.
|
14 |
IETF RFC 3080, The Blocks Extensible Exchange Protocol Core
|
15 |
IETF RFC 5070, Incident Object Description Exchange Format
|
16 |
IETF RFC 5901, Extensions to the IODEF-Document Class for Reporting Phishing
|
17 |
IETF RFC 6046, Transport of Real-time Internetwork Defense (RID) Messages
|
18 |
MITRE, Malware Attribute Enumeration and Characterization
|
19 |
MITRE, Open Vulnerability and Assessment Language
|
20 |
W3C, Simple Object Access Protocol
|
21 |
Traffic Light Protocol. Information Sharing Levels, CPNI Information Exchange, UK CPNI (April 2010)
|
22 |
Trusted Computing Group, Trusted Network Connect
|
23 |
ITU-T SG17 TD1420, "Report of Q.4/17"
|
24 |
ITU-T SG17 TD1161 Rev.6, "Recommendation ITU-T X.1500 Cybersecurity information exchange techniques"
|
25 |
ITU-T SG17 TD1162 Rev.2. "Draft New Rec. ITU-T X.1520, Common vulnerabilities and exposures for determination"
|
26 |
ITU-T SG17 TD1177 Rev.2. "Draft New Rec. ITU-T X.1521, Common vulnerability scoring system for determination"
|
27 |
ITU-T SG17 TD1482, "Tutorial Presentation on Application of CYBEX (Cybersecurity Information Exchange) techniques to future networks"
|
28 |
ITU-T SG17 TD1404, "Recommendation Summaries Q.4/17"
|
29 |
Recommendaton ITU-T X.1205, "Overview of cybersecurity"
|
30 |
Recommendaton ITU-T X.1206, "A vendor-neutral framework for automatic notification of security related information and dissemination of updates"
|
31 |
Recommendation ITU-T X.1207, "Guidelines for telecommunication service providers for addressing the risk of spyware and potentially unwanted software"
|
32 |
Recommendation ITU-T X.1209, "Capabilities and their context scenarios for cybersecurity information sharing and exchange"
|
33 |
Trusted Computing Group, Trusted Platform Modules
|
34 |
NIST, The eXtensible Configuration Checklist Description Format
|