{"id":352250,"date":"2024-10-20T00:51:29","date_gmt":"2024-10-20T00:51:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-29181-52014\/"},"modified":"2024-10-26T00:50:22","modified_gmt":"2024-10-26T00:50:22","slug":"bsi-pd-iso-iec-tr-29181-52014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-29181-52014\/","title":{"rendered":"BSI PD ISO\/IEC TR 29181-5:2014"},"content":{"rendered":"
This part of ISO\/IEC TR 29181 describes the problem statements of current network and the requirements for Future Network in the security perspective. This part of ISO\/IEC TR 29181 mainly specifies<\/p>\n
problems of the current network in security environment, and<\/p>\n<\/li>\n
requirements for security support in Future Network.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1\tScope 2\tTerms and definitions 3\tAbbreviations <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4\tGeneral 4.1\tSecurity environment in FN 4.2\tRelated works on security in FN 5\tProblem statement of current network in security environment 5.1\tThe existing problems and reasons of network security <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5.1.1\tNetwork users undertake the security risk and responsibilities 5.1.2\tIrregular Address and no truly proof for origin 5.1.3\tCentral control may lead to security disaster 5.2\tThe current network security protection measures and effect 5.2.1\tCurrent security protection means of common network user <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.2.2\tCurrent security protection means of professional users 5.3\tDisadvantages of existing network security defense system 6\tThe goal and requirements of FN security 6.1\tThe goal of FN security <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.2\tThe requirements of FN security 6.2.1\tFrom passive defense to active management 6.2.2\tReplace computing confrontation with authentication technology 6.2.3\tForming one to more system solution with authentication technology 6.3\tFN security technical system 6.3.1\tIdentity Authentication system 6.3.2\tPlatform security (Trusted Computing) 6.3.3\tSecure connection and transmission 6.3.4\tApplication security 6.3.5\tThe functional requirements of FN security system <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 7\tConsideration of Key technology for FN security implementation 7.1\tSupport the real-name and anonymity authentication 7.2\tSupport large-scale application 7.3\tSupport end-to-end directly authentication and key exchange 7.4\tSupport management domain segmentation and cross-domain authentication 7.5\tSimple structure, convenient use, low cost, and easy popularized 7.6\tThe application method to realize Identity Authentication <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Future Network. Problem statement and requirements – Security<\/b><\/p>\n |