{"id":515092,"date":"2024-11-05T14:33:23","date_gmt":"2024-11-05T14:33:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-27033-318\/"},"modified":"2024-11-05T14:33:23","modified_gmt":"2024-11-05T14:33:23","slug":"can-csa-iso-iec-27033-318","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-27033-318\/","title":{"rendered":"CAN\/CSA-ISO\/IEC 27033-3:18"},"content":{"rendered":"

CSA Preface<\/strong><\/p>\n

<\/p>\n

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n

<\/p>\n

Scope<\/strong><\/p>\n

<\/p>\n

This part of ISO\/IEC 27033 describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security design techniques and controls required to mitigate the associated risks. Where relevant, it includes references to ISO\/IEC 27033-4 to ISO\/IEC 27033-6 to avoid duplicating the content of those documents.<\/p>\n

<\/p>\n

The information in this part of ISO\/IEC 27033 is for use when reviewing technical security architecture\/design options and when selecting and documenting the preferred technical security architecture\/design and related security controls, in accordance with ISO\/IEC 27033-2. The particular information selected (together with information selected from ISO\/IEC 27033-4 to ISO\/IEC 27033-6) will depend on the characteristics of the network environment under review, i.e. the particular network scenario(s) and \u2018technology\u2019 topic(s) concerned.<\/p>\n

<\/p>\n

Overall, this part of ISO\/IEC 27033 will aid considerably the comprehensive definition and implementation of security for any organizations network environment.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology \u2014 Security techniques \u2014 Network security \u2014 Part 3: Reference networking scenarios \u2014 Threats, design techniques and control issues<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
CSA<\/b><\/a><\/td>\n2018<\/td>\n46<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":515102,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[657,2674],"product_tag":[],"class_list":{"0":"post-515092","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/515092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/515102"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=515092"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=515092"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=515092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}