IEC > Webstore > Search > Register > Check out > Payment > Order confirmation

Publication detail

 
Reference ISO/IEC 18028-5 ed1.0 withdrawn corrigendum
> preview
Title Information technology -- Security techniques -- IT network security -- Part 5: Securing communications across networks using virtual private networks
Publication date 2006-07-05
Format, price
(Swiss francs)
and language
118.- 21 pages
118.- 375 Kb
 
Abstract ISO/IEC 18028-5:2006 provides detailed guidance on the security aspects of the management, operation and use of IT networks, and their inter-connections.

ISO/IEC 18028-5:2006 defines techniques for securing inter-network connections that are established using virtual private networks (VPNs). It is relevant to all personnel who are involved in the detailed planning, design and implementation of VPN security (for example IT network managers, administrators, engineers, and IT network security officers).

The general objectives of ISO/IEC 18028 are to extend the security management guidelines provided in ISO/IEC TR 13335 and ISO/IEC 17799, by detailing the specific operations and mechanisms needed to implement network security controls in a wider range of network environments, providing a bridge between general IT security management issues and network security technical implementations.

The objective of ISO/IEC 18028-5:2006 is to provide support service to different organizations, IT network managers, administrators, technicians, and IT security officers in choosing the appropriate virtual private network solution.

ISO/IEC 18028-5:2006 describes general principals of organization, structure, framework and usage of a virtual private IT networks (VPN). It discusses functional area, used standards and network protocols, the various different types of VPN, their respective requirements, characteristics, and other aspects.
Technical Committee JTC 1/SC 27 - IT security techniques  RSS
ICS Codes
35.040 Character sets and information coding
*Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.
 
Replaced by
 
Work in progress
ProjectStage codeForecast publication date
No project under development--


Search

>> Advanced search

Quick access by ref. number



Basket

Your basket is empty
Your country is :
Your TVA is : You must login...

Payment

Accepted credit cards:
Prices in CHF (Swiss francs)
Request a pro forma to pay by bank transfer or cheque
Learn how to share your publications with your colleagues, using networking options
Prices in CHF (Swiss francs)
We accept the following credit cards:
To pay by bank transfer: request a pro forma
If you purchase regularly through the IEC Webstore you can open a corporate account

Just Published

>> Published in the last 30 days

Bestsellers

  1. IEC 60825-1 Ed. 3.0
  2. IEC 61010-1 Ed. 3.0
  3. IEC 60601-1-2 Ed. 4.0
  4. IEC 62682 Ed. 1.0
  5. IEC 61000-4-5 Ed. 3.0
  6. IEC 61000-4-6 Ed. 4.0
  7. IEC 60204-1 Ed. 5.1
  8. IEC 62304 Ed. 1.0
  9. IEC/TS 61400-26-2 Ed. 1.0
  10. IEC 60068-2-30 Ed. 3.0