Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $36.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

This Recommendation presents a cybersecurity information exchange (CYBEX) model and discusses techniques that can be used to facilitate the exchange of cybersecurity information. These techniques can be used individually or in combinations, as desired or appropriate, to enhance cybersecurity through coherent, comprehensive, global, timely and assured information exchange. No obligations to exchange information are implied, nor are the means of acquisition or ultimate use of the information treated. The techniques include the structured global discovery and interoperability of cybersecurity information in such a way as to allow for continual evolution to accommodate the significant activities and specification evolution occurring in numerous cybersecurity forums. CYBEX is one of the elements providing confidence and security in the use of ICTs.

This Recommendation has the following basic functions that can be used separately or together as appropriate:

• structuring cybersecurity information for exchange purposes;

• identifying and discovering cybersecurity information and entities;

• establishment of trust and policy agreement between exchanging entities;

• requesting and responding with cybersecurity information;

• assuring the integrity of the cybersecurity information exchange.

Subject to agreed policies and applicable laws and regulations, the means of acquiring information as well as the uses made of the information are specifically out of scope and not treated in this Recommendation. Some specific national and regional regulations and legislations may require implementation of mechanisms to protect personally identifiable information. Neither the techniques described in this Recommendation nor the exchange of related cybersecurity information are mandated by this Recommendation.

 

Amendments, rulings, supplements, and errata

  1. ITU-T X.1500 AMD 8


    Overview of cybersecurity information exchange Amendment 8: Revised structured cybersecurity information exchange techniques

  2. ITU-T X.1500 AMD 2


    Overview of cybersecurity information exchange Amendment 2: Revised structured cybersecurity information exchange techniques

  3. ITU-T X.1500 AMD 4


    Overview of cybersecurity information exchange Amendment 4: Revised structured cybersecurity information exchange techniques

  4. ITU-T X.1500 AMD 10


    Overview of cybersecurity information exchange Revised structured cybersecurity information exchange techniques

  5. ITU-T X.1500 AMD 12


    Overview of cybersecurity information exchange Amendment 12

  6. ITU-T X.1500 AMD 7


    Overview of cybersecurity information exchange Amendment 7: Revised structured cybersecurity information exchange techniques

  7. ITU-T X.1500 AMD 1


    Overview of cybersecurity information exchange Amendment 1: Revised structured cybersecurity information exchange techniques

  8. ITU-T X.1500 AMD 5


    Overview of cybersecurity information exchange Amendment 5: Revised structured cybersecurity information exchange techniques

  9. ITU-T X.1500 AMD 6


    Overview of cybersecurity information exchange Amendment 6: Revised structured cybersecurity information exchange techniques

  10. ITU-T X.1500 AMD 9


    Overview of cybersecurity information exchange Amendment 9: Revised structured cybersecurity information exchange techniques

  11. ITU-T X.1500 AMD 3


    Overview of cybersecurity information exchange Amendment 3: Revised structured cybersecurity information exchange techniques

  12. ITU-T X.1500 AMD 11


    Overview of cybersecurity information exchange Amendment 11: Revised structured cybersecurity information exchange techniques