ITU-T X 816-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Security Audit and Alarms Framework - Data Networks and Open System Co.pdf
《ITU-T X 816-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Security Audit and Alarms Framework - Data Networks and Open System Co.pdf》由会员分享,可在线阅读,更多相关《ITU-T X 816-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Security Audit and Alarms Framework - Data Networks and Open System Co.pdf(23页珍藏版)》请在麦多课文档分享上搜索。
1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS SECURITY X.816 (1 1 /95) INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS: SECURITY AUDIT AND ALARMS FRAMEWORK ITU-T Re
2、commendation X.816 (Previously “CCITT Recommendation”) COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesFOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommunications. The
3、 ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. Some 179 member countries, 84 telecom operating entities, 145 scientific and industrial organizations and 38 international organizations participate in ITU-T which is the body which sets world telecommunications s
4、tandards (Recommendations). The approval of Recommendations by the Members of IT-T is covered by the procedure laid down in WTSC Resolution No. 1 (Helsinki, 1993). In addition, the World Telecommunication Standardization Conference (WTSC), which meets every four years, approves Recommendations submi
5、tted to it and establishes the study programme for the following period. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. The text of IT-T Recommendation X.816 was approved on 21st of November 19
6、95. The identical text is also published as ISOAEC International Standard 10181-7. NOTE e In this Recommendation, the expression “Administration” is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. O ITU 1996 All rights reserved. No part of
7、this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the IT. COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T
8、 RECMN*X.BLh 95 m 4862591 Ob33403 587 m Subject area PUBLIC DATA NETWORKS Services and Facilities Interfaces Transmission, Signalling and Switching Network Asuects ITU-T X-SERIES RECOMMENDATIONS Recommendation Series X.1-X. 19 X.20-X.49 X.50-X.89 x.90-x. 149 DATA NETWORKS AND OPEN SYSTEM COMMUNICATI
9、ONS Maintenance Administrative Arrangements OPEN SYSTEMS INTERCONNECTION Model and Notation Service Definitions Connection-mode Protocol Specifications Connectionless-mode Protocol Specifications PICS Proformas Protocol Identification Security Protocols Layer Managed Objects (February 1994) X. 150-X
10、. 179 X. 180-X. 199 X.200-X.209 X.210-X.2 19 X.220-X.229 X.230-X.239 X.240-X.259 X.260-X.269 X.270-X.279 X.280-X.289 ORGANIZATION OF X-SERIES RECOMMENDATIONS Conformance Testing INTERWORKING BETWEEN NETWORKS X.290-X.299 General Mobile Data Transmission Systems Management MESSAGE “JILING SYSTEMS x.30
11、0-x.349 X.350-X.369 X.370-X.399 r x.4nc)-x 499 Networking Naming, Addressing and Registration Abstract Syntax Notation One (ASN.l) OS1 MANAGEMENT SECURITY OS1 APPLICATIONS Commitment, Concurrency and Recovery Transaction Processing Remote Operations _. X.500-X.599 DIRECTORY OS1 NETWORKING AND SYSTEM
12、 ASPECTS X.600-X.649 X.650-X.679 X.680-X.699 X.700-X.799 X.800-X.849 X.850-X.859 X.860-X.879 X.880-X.899 I OPEN DISTRIBUTED PROCESSING I X.900-X.999 I COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services . ITU-T RECMN*X.BLb 95 m 4862573 Ob3
13、3402 433 H 1 2 3 4 5 6 7 8 9 10 CONTENTS Scope Normative references . 2.1 Identical Recommendations I International Standards 2.2 Paired Recommendations I International Standards equivalent in technical content Definitions 3.1 Basic Reference Model definitions . 3.2 Security architecture definitions
14、 . 3.3 Management framework definitions . 3.4 Security framework overview definitions . 3.5 Additional definitions . Abbreviations . Notation General discussion of security audit and alarms 6.1 Model and functions . 6.2 Phases of security audit and alarms procedures 6.3 Correlation of audit informat
15、ion . Policy and other aspects of security audit and alarms 7.1 Policy 7.2 Legal aspects . 7.3 Protection requirements Security audit and alarms information and facilities 8.1 Audit and alarms information . 8.2 Security audit and alarms facilities . Security audit and alarms mechanisms Interaction w
16、ith other security services and mechanisms 10.1 Entity authentication . 10.3 Access Control 10.4 Confidentiality 10.6 Non-repudiation 10.2 Data origin authentication . 10.5 Integrity . Annex A . General security audit and alarms principles for OS1 Annex B - Realization of the security audit and alar
17、m model . Annex C - Security Audit and Alarms Facilities Outline . Page 1 1 2 2 2 2 2 3 3 3 4 4 4 4 6 8 8 8 8 8 9 9 10 11 12 t2 12 12 12 12 12 13 15 17 Annex D . Time Registration of Audit Events 18 ITU-T Rec . X.816 (1995 E) 1 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsL
18、icensed by Information Handling ServicesITU-T RECMNtX.8Lb 95 Lib259L Ob33403 35T Summary This Recommendation I International Standard describes a basic model for handling security alarms and for conducting a security audit for open systems. A security audit is an independent review and examination o
19、f system records and activities. The security audit service provides an audit authority with the ability to specify, select and manage the events which need to be recorded within a security audit trail. Introduction This Recommendation I International Standard refines the concept of security audit d
20、escribed in IT-T Rec. X.810 I ISOAEC 10181-1. This includes event detection and actions resulting from these events. The framework, therefore, addresses both security audit and security alarms. A security audit is an independent review and examination of system records and activities. The purposes o
21、f a security audit include: - - - - - - assisting in the identification and analysis of unauthorized actions or attacks; helping ensure that actions can be attributed to the entities responsible for those actions; contributing to the development of improved damage control procedures; confirming comp
22、liance with established security policy; reporting information that may indicate inadequacies in system controls; and identifying possible required changes in controls, policy and procedures. In this framework, a security audit consists of the detection, collection and recording of various security-
23、related events in a security audit trail and analysis of those events. Both audit and accountability require that information be recorded. A security audit ensures that sufficient information is recorded about both routine and exceptional events so that later investigations can determine if security
24、 violations have occurred and, if so, what information or other resources have been compromised. Accountability ensures that relevant information is recorded about actions performed by users, or processes acting on their behalf, so that the consequences of those actions can later be linked to the us
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTX8161995INFORMATIONTECHNOLOGYOPENSYSTEMSINTERCONNECTIONSECURITYFRAMEWORKSFOROPENSYSTEMSSECURITYAUDITANDALARMSFRAMEWORKDATANETWORKSANDOPENSYSTEMCOPDF

链接地址:http://www.mydoc123.com/p-805776.html