Browse > Article

ITU-T SG17 사이버보안 국제표준화 동향  

Kim, Mi-Joo (한국인터넷진흥원 인터넷침해대응센터 침해예방단 연구개발팀)
Chul, Jung-Hyun (한국인터넷진흥원 인터넷침해대응센터 침해예방단 연구개발팀)
Youl, Youm-Heung (순천향대학교 정보보호학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Recommendation ITU-T X.1205 supplement 8, "Supplement on best practices against botnet threats"
2 Tony Rutkowski, "Application of CYBEX techniques to future networks," SG17 Tutorial.
3 김미주, "글로벌 사이버보안 정보교류 국제표준화 동향," TTA ICT Standard Weekly 2009-46호.
4 MITRE, Assessment Results Format.
5 MITRE, Common Attack Pattern Enumeration and Classification
6 MITRE, Common Configuration Enumeration
7 MITRE, Common Event Expression
8 MITRE, Common Platform Enumeration
9 MITRE, Common Weakness Enumeration
10 MITRE, Common Weakness Scoring System.
11 Electronic Authentication Guideline, NIST Special Publication 800-63 Version 1.0.2, April 2006
12 CA/Browser Forum, Guidelines for the Issuance and Management of Extended Validation Certificates, Ver. 1.3
13 Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates, ETSI TS102042.
14 IETF RFC 3080, The Blocks Extensible Exchange Protocol Core
15 IETF RFC 5070, Incident Object Description Exchange Format
16 IETF RFC 5901, Extensions to the IODEF-Document Class for Reporting Phishing
17 IETF RFC 6046, Transport of Real-time Internetwork Defense (RID) Messages
18 MITRE, Malware Attribute Enumeration and Characterization
19 MITRE, Open Vulnerability and Assessment Language
20 W3C, Simple Object Access Protocol
21 Traffic Light Protocol. Information Sharing Levels, CPNI Information Exchange, UK CPNI (April 2010)
22 Trusted Computing Group, Trusted Network Connect
23 ITU-T SG17 TD1420, "Report of Q.4/17"
24 ITU-T SG17 TD1161 Rev.6, "Recommendation ITU-T X.1500 Cybersecurity information exchange techniques"
25 ITU-T SG17 TD1162 Rev.2. "Draft New Rec. ITU-T X.1520, Common vulnerabilities and exposures for determination"
26 ITU-T SG17 TD1177 Rev.2. "Draft New Rec. ITU-T X.1521, Common vulnerability scoring system for determination"
27 ITU-T SG17 TD1482, "Tutorial Presentation on Application of CYBEX (Cybersecurity Information Exchange) techniques to future networks"
28 ITU-T SG17 TD1404, "Recommendation Summaries Q.4/17"
29 Recommendaton ITU-T X.1205, "Overview of cybersecurity"
30 Recommendaton ITU-T X.1206, "A vendor-neutral framework for automatic notification of security related information and dissemination of updates"
31 Recommendation ITU-T X.1207, "Guidelines for telecommunication service providers for addressing the risk of spyware and potentially unwanted software"
32 Recommendation ITU-T X.1209, "Capabilities and their context scenarios for cybersecurity information sharing and exchange"
33 Trusted Computing Group, Trusted Platform Modules
34 NIST, The eXtensible Configuration Checklist Description Format