Show simple item record

Information technology - Security techniques - IT network security - Part 4: Securing remote access

contributor authorCSA - CSA Group
date accessioned2017-09-04T18:44:55Z
date available2017-09-04T18:44:55Z
date copyright2006.12.01 (R 2011)
date issued2011
identifier otherKFYCDFAAAAAAAAAA.pdf
identifier urihttp://yse.yabesh.ir/std;query=autho1826AF679D40527318548F1EFDEC014A0Facilities%20Engineering%20Command%22/handle/yse/226338
description abstractThis part of ISO/IEC 18028 provides guidance for securely using remote access – a method to remotely connect a computer either to another computer or to a network using public networks and its implication for IT security. In this it introduces the different types of remote access including the protocols in use, discusses the authentication issues related to remote access and provides support when setting up remote access securely. It is intended to help network administrators and technicians who plan to make use of this kind of connection or who already have it in use and need advice on how to set it up securely and operate it securely.
languageEnglish
titleCSA CAN/CSA-ISO/IEC 18028-4:06num
titleInformation technology - Security techniques - IT network security - Part 4: Securing remote accessen
typestandard
page62
statusActive
treeCSA - CSA Group:;2011
contenttypefulltext


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record