BS ISO IEC 10181-7-1996 Information technology - Open systems interconnection - Security frameworks for open systems - Security audit and alarms framework《信息技术 开放式系统互连 开放式.pdf
《BS ISO IEC 10181-7-1996 Information technology - Open systems interconnection - Security frameworks for open systems - Security audit and alarms framework《信息技术 开放式系统互连 开放式.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 10181-7-1996 Information technology - Open systems interconnection - Security frameworks for open systems - Security audit and alarms framework《信息技术 开放式系统互连 开放式.pdf(22页珍藏版)》请在麦多课文档分享上搜索。
1、BRITISH STANDARD BS ISO/IEC 10181-7:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework (ITU-T Rec. X.816 (1995)| ISO/IEC10181-7:1996) ICS 35.100.01BSISO/IEC 10181-7:1996 This British Standard, having been prepared under
2、the direction of the DISC Board, was published under the authority of the Standards Board and comes into effect on 15 November 1996 BSI 11-1998 ISBN 0 580 26525 0 National foreword This British Standard reproduces verbatim ISO/IEC 10181-7:1996, and implements it as the UK national standard. The UK p
3、articipation in its preparation was entrusted to Technical Committee IST/21, Open Systems Interconnection, Data Management and Open Distributed Processing, which has the responsibility to: aid enquirers to understand the text; present to the responsible international/European committee any enquiries
4、 on the interpretation, or proposals for change, and keep the UK interests informed; monitor related international and European developments and promulgate them in the UK. A list of organizations represented on this committee is available on request. Cross-references The British Standards which impl
5、ement international or European publications referred to in this document may be found in the BSI Standards Catalogue under the section entitled “International Standards Correspondence Index”, or using the “Find” facility of the BSI Standards Electronic Catalogue. A British Standard does not purport
6、 to include all the necessary provisions of a contract. Users of British Standards are responsible for their correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. Summary of pages This document comprises a front cover, an inside front cove
7、r, the ISO/IEC title page, pages ii to iv, pages 1 to 14 an inside back cover andaback cover. This standard has been updated (see copyright date) and may have had amendments incorporated. This will be indicated in the amendment table on theinside front cover. Amendments issued since publication Amd.
8、 No. Date CommentsBSISO/IEC 10181-7:1996 ii BSI 11-1998 Contents Page Foreword iii Introduction 1 1 Scope 1 2 Normative references 2 2.1 Identical Recommendations | International Standards 2 2.2 Paired Recommendations | International Standards equivalent in technical content 2 3 Definitions 2 3.1 Ba
9、sic Reference Model definitions 2 3.2 Security architecture definitions 2 3.3 Management framework definitions 2 3.4 Security framework overview definitions 3 3.5 Additional definitions 3 4 Abbreviations 3 5 Notation 3 6 General discussion of security audit and alarms 4 6.1 Model and functions 4 6.2
10、 Phases of security audit and alarms procedures 6 6.3 Correlation of audit information 7 7 Policy and other aspects of security audit and alarms 7 7.1 Policy 7 7.2 Legal aspects 8 7.3 Protection requirements 8 8 Security audit and alarms information and facilities 8 8.1 Audit and alarms information
11、8 8.2 Security audit and alarms facilities 9 9 Security audit and alarms mechanisms 10 10 Interaction with other security services and mechanisms 10 10.1 Entity authentication 10 10.2 Data origin authentication 10 10.3 Access Control 10 10.4 Confidentiality 10 10.5 Integrity 10 10.6 Non-repudiation
12、10 Annex A General security audit and alarms principles for OSI 11 Annex B Realization of the security audit and alarm model 12 Annex C Security Audit and Alarms Facilities Outline 14 Annex D Time Registration of Audit Events Inside back cover Figure 1 Security audit and alarms model 5 Figure 2 Dist
13、ributed audit trail model 6 Figure B.1 An Example of realization of a alarm and audit service 13BSISO/IEC 10181-7:1996 BSI 11-1998 iii Foreword ISO (the International Organization for Standardization) and IEC (theInternational Electrotechnical Commission) form the specialized system for worldwide st
14、andardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields
15、 of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. Draft International Standards adopted b
16、y the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. International Standard ISO/IEC 10181-7 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information
17、 technology, Subcommittee SC 21, Open systems interconnection, data management and open distributed processing, in collaboration with ITU-T. The identical text is published as ITU-TRecommendation X.816. ISO/IEC 10181 consists of the following parts, under the general title Information technology Ope
18、n Systems Interconnection Security frameworks for open systems: Part 1: Overview; Part 2: Authentication framework; Part 3: Access control framework; Part 4: Non-repudiation framework; Part 5: Confidentiality framework; Part 6: Integrity framework; Part 7: Security audit and alarms framework. Annexe
19、s A to D of this part of ISO/IEC 10181 are for information only.iv blankBSISO/IEC 10181-7:1996 BSI 11-1998 1 Introduction This Recommendation|International Standard refines the concept of security audit described in ITU-T Rec. X.810|ISO/IEC 10181-1. This includes event detection and actions resultin
20、g from these events. The framework, therefore, addresses both security audit and security alarms. A security audit is an independent review and examination of system records and activities. The purposes of a security audit include: assisting in the identification and analysis of unauthorized actions
21、 or attacks; helping ensure that actions can be attributed to the entities responsible for those actions; contributing to the development of improved damage control procedures; confirming compliance with established security policy; reporting information that may indicate inadequacies in system cont
22、rols; and identifying possible required changes in controls, policy and procedures. In this framework, a security audit consists of the detection, collection and recording of various security-related events in a security audit trail and analysis of those events. Both audit and accountability require
23、 that information be recorded. A security audit ensures that sufficient information is recorded about both routine and exceptional events so that later investigations can determine if security violations have occurred and, if so, what information or other resources have been compromised. Accountabil
24、ity ensures that relevant information is recorded about actions performed by users, or processes acting on their behalf, so that the consequences of those actions can later be linked to the user(s) in question, and the user(s) can be held accountable for his or her actions. Provision of a security a
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC1018171996INFORMATIONTECHNOLOGYOPENSYSTEMSINTERCONNECTIONSECURITYFRAMEWORKSFOROPENSYSTEMSSECURITYAUDITANDALARMSFRAMEWORK

链接地址:http://www.mydoc123.com/p-396183.html