{"id":408381,"date":"2024-10-20T05:30:23","date_gmt":"2024-10-20T05:30:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30389144-dc\/"},"modified":"2024-10-26T10:01:11","modified_gmt":"2024-10-26T10:01:11","slug":"bsi-22-30389144-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30389144-dc\/","title":{"rendered":"BSI 22\/30389144 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Relationship between Internet security, web security, network security and cybersecurity <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6 Overview of Internet security <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7 Interested parties 7.1 General 7.2 Users <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.3 Coordinator and standardization organisations 7.4 Government authorities <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.5 Law enforcement agencies 7.6 Internet service providers (ISP) 8 Internet security risk assessment and treatment 8.1 General 8.2 Threats <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3 Vulnerabilities 8.4 Attack vectors <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 9 Security guidelines for the Internet 9.1 General <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.2 Controls for Internet security 9.2.1 General 9.2.2 Policies for Internet security <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9.2.3 Access control 9.2.4 Education, awareness & training <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9.2.5 Security incident management <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9.2.6 Asset management 9.2.7 Supplier management <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.2.8 Business continuity over the Internet <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.2.9 Privacy protection over the Internet 9.2.10 Vulnerability management <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.2.11 Network management <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.2.12 Protection against malware <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.2.13 Change management 9.2.14 Identification of applicable legislation and compliance requirements 9.2.15 Use of cryptography <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 9.2.16 Application security for Internet-facing applications <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.2.17 Endpoint device management 9.2.18 Monitoring <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex\u20acA (Informative) Cross-references between ISO\/IEC 27032 and ISO\/IEC 27002 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 27032. Cybersecurity. Guidelines for Internet security<\/b><\/p>\n |