Text
ISO/IEC 27033 -- Information technology -- security techniques -- network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
Contents :
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Document structure
6 Overview
6.1 Introduction
6.2 Types of VPNs
7 Security Threats
8 Security Requirements
8.1 Overview
8.2 Confidentiality
8.3 Integrity
8.4 Authenticity
8.5 Authorization
8.6 Availability
8.7 Tunnel Endpoint Security
9 Security Controls
9.1 Security aspects
9.2 Virtual circuits
10 Design Techniques
10.1 Overview
10.2 Regulatory and legislative aspects
10.3 VPN management aspects
10.4 VPN architectural aspects
10.5 VPN technical considerations
11 Guidelines for Product Selection
11.1 Carrier protocol selection
11.2 VPN appliances
Bibliography
No other version available