CSA CAN/CSA-ISO/IEC 18028-4:06
Information technology - Security techniques - IT network security - Part 4: Securing remote access
Organization:
CSA - CSA Group
Year: 2011
Abstract: This part of ISO/IEC 18028 provides guidance for securely using remote access – a method to remotely connect a computer either to another computer or to a network using public networks and its implication for IT security. In this it introduces the different types of remote access including the protocols in use, discusses the authentication issues related to remote access and provides support when setting up remote access securely. It is intended to help network administrators and technicians who plan to make use of this kind of connection or who already have it in use and need advice on how to set it up securely and operate it securely.
Collections
:
-
Statistics
CSA CAN/CSA-ISO/IEC 18028-4:06
Show full item record
contributor author | CSA - CSA Group | |
date accessioned | 2017-09-04T18:44:55Z | |
date available | 2017-09-04T18:44:55Z | |
date copyright | 2006.12.01 (R 2011) | |
date issued | 2011 | |
identifier other | KFYCDFAAAAAAAAAA.pdf | |
identifier uri | http://yse.yabesh.ir/std;query=autho1826AF679D40527318548F1EFDEC014A0Facilities%20Engineering%20Command%22/handle/yse/226338 | |
description abstract | This part of ISO/IEC 18028 provides guidance for securely using remote access – a method to remotely connect a computer either to another computer or to a network using public networks and its implication for IT security. In this it introduces the different types of remote access including the protocols in use, discusses the authentication issues related to remote access and provides support when setting up remote access securely. It is intended to help network administrators and technicians who plan to make use of this kind of connection or who already have it in use and need advice on how to set it up securely and operate it securely. | |
language | English | |
title | CSA CAN/CSA-ISO/IEC 18028-4:06 | num |
title | Information technology - Security techniques - IT network security - Part 4: Securing remote access | en |
type | standard | |
page | 62 | |
status | Active | |
tree | CSA - CSA Group:;2011 | |
contenttype | fulltext |