|
Cybersecurity standards are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.〔http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=9136〕 This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks. The principal objective is to reduce the risks, including prevention or mitigation of cybersecurity attacks. These published materials consist of collections of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies. The choice between writing cybersecurity as two words (''cyber security'') or one (''cybersecurity'') depends on the institution. The spelling in Europe tends to consist of two words. 〔https://portal.etsi.org/tb.aspx?tbid=824&SubTB=824〕 ==History== Cybersecurity standards have existed over several decades as users and providers have collaborated in many domestic and international forums to effect the necessary capabilities, policies, and practices - generally emerging from work at the Stanford Consortium for Research on Information Security and Policy in the 1990s.〔http://fsi.stanford.edu/research/consortium_for_research_on_information_security_and_policy〕 Also many tasks that were once carried out by hand are now carried out by computer; therefore there is a need for information assurance (IA) and security. ==ETSI Cyber Security Technical Committee (TC CYBER)== (詳細はウィキペディア(Wikipedia)』 ■ウィキペディアで「Cyber security standards」の詳細全文を読む スポンサード リンク
|