ImageVerifierCode 换一换
格式:PDF , 页数:23 ,大小:1.17MB ,
资源ID:805776      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-805776.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 816-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Security Audit and Alarms Framework - Data Networks and Open System Co.pdf)为本站会员(ownview251)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 816-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Security Audit and Alarms Framework - Data Networks and Open System Co.pdf

1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS SECURITY X.816 (1 1 /95) INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS: SECURITY AUDIT AND ALARMS FRAMEWORK ITU-T Re

2、commendation X.816 (Previously “CCITT Recommendation”) COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesFOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommunications. The

3、 ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. Some 179 member countries, 84 telecom operating entities, 145 scientific and industrial organizations and 38 international organizations participate in ITU-T which is the body which sets world telecommunications s

4、tandards (Recommendations). The approval of Recommendations by the Members of IT-T is covered by the procedure laid down in WTSC Resolution No. 1 (Helsinki, 1993). In addition, the World Telecommunication Standardization Conference (WTSC), which meets every four years, approves Recommendations submi

5、tted to it and establishes the study programme for the following period. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. The text of IT-T Recommendation X.816 was approved on 21st of November 19

6、95. The identical text is also published as ISOAEC International Standard 10181-7. NOTE e In this Recommendation, the expression “Administration” is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. O ITU 1996 All rights reserved. No part of

7、this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the IT. COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T

8、 RECMN*X.BLh 95 m 4862591 Ob33403 587 m Subject area PUBLIC DATA NETWORKS Services and Facilities Interfaces Transmission, Signalling and Switching Network Asuects ITU-T X-SERIES RECOMMENDATIONS Recommendation Series X.1-X. 19 X.20-X.49 X.50-X.89 x.90-x. 149 DATA NETWORKS AND OPEN SYSTEM COMMUNICATI

9、ONS Maintenance Administrative Arrangements OPEN SYSTEMS INTERCONNECTION Model and Notation Service Definitions Connection-mode Protocol Specifications Connectionless-mode Protocol Specifications PICS Proformas Protocol Identification Security Protocols Layer Managed Objects (February 1994) X. 150-X

10、. 179 X. 180-X. 199 X.200-X.209 X.210-X.2 19 X.220-X.229 X.230-X.239 X.240-X.259 X.260-X.269 X.270-X.279 X.280-X.289 ORGANIZATION OF X-SERIES RECOMMENDATIONS Conformance Testing INTERWORKING BETWEEN NETWORKS X.290-X.299 General Mobile Data Transmission Systems Management MESSAGE “JILING SYSTEMS x.30

11、0-x.349 X.350-X.369 X.370-X.399 r x.4nc)-x 499 Networking Naming, Addressing and Registration Abstract Syntax Notation One (ASN.l) OS1 MANAGEMENT SECURITY OS1 APPLICATIONS Commitment, Concurrency and Recovery Transaction Processing Remote Operations _. X.500-X.599 DIRECTORY OS1 NETWORKING AND SYSTEM

12、 ASPECTS X.600-X.649 X.650-X.679 X.680-X.699 X.700-X.799 X.800-X.849 X.850-X.859 X.860-X.879 X.880-X.899 I OPEN DISTRIBUTED PROCESSING I X.900-X.999 I COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services . ITU-T RECMN*X.BLb 95 m 4862573 Ob3

13、3402 433 H 1 2 3 4 5 6 7 8 9 10 CONTENTS Scope Normative references . 2.1 Identical Recommendations I International Standards 2.2 Paired Recommendations I International Standards equivalent in technical content Definitions 3.1 Basic Reference Model definitions . 3.2 Security architecture definitions

14、 . 3.3 Management framework definitions . 3.4 Security framework overview definitions . 3.5 Additional definitions . Abbreviations . Notation General discussion of security audit and alarms 6.1 Model and functions . 6.2 Phases of security audit and alarms procedures 6.3 Correlation of audit informat

15、ion . Policy and other aspects of security audit and alarms 7.1 Policy 7.2 Legal aspects . 7.3 Protection requirements Security audit and alarms information and facilities 8.1 Audit and alarms information . 8.2 Security audit and alarms facilities . Security audit and alarms mechanisms Interaction w

16、ith other security services and mechanisms 10.1 Entity authentication . 10.3 Access Control 10.4 Confidentiality 10.6 Non-repudiation 10.2 Data origin authentication . 10.5 Integrity . Annex A . General security audit and alarms principles for OS1 Annex B - Realization of the security audit and alar

17、m model . Annex C - Security Audit and Alarms Facilities Outline . Page 1 1 2 2 2 2 2 3 3 3 4 4 4 4 6 8 8 8 8 8 9 9 10 11 12 t2 12 12 12 12 12 13 15 17 Annex D . Time Registration of Audit Events 18 ITU-T Rec . X.816 (1995 E) 1 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsL

18、icensed by Information Handling ServicesITU-T RECMNtX.8Lb 95 Lib259L Ob33403 35T Summary This Recommendation I International Standard describes a basic model for handling security alarms and for conducting a security audit for open systems. A security audit is an independent review and examination o

19、f system records and activities. The security audit service provides an audit authority with the ability to specify, select and manage the events which need to be recorded within a security audit trail. Introduction This Recommendation I International Standard refines the concept of security audit d

20、escribed in IT-T Rec. X.810 I ISOAEC 10181-1. This includes event detection and actions resulting from these events. The framework, therefore, addresses both security audit and security alarms. A security audit is an independent review and examination of system records and activities. The purposes o

21、f a security audit include: - - - - - - assisting in the identification and analysis of unauthorized actions or attacks; helping ensure that actions can be attributed to the entities responsible for those actions; contributing to the development of improved damage control procedures; confirming comp

22、liance with established security policy; reporting information that may indicate inadequacies in system controls; and identifying possible required changes in controls, policy and procedures. In this framework, a security audit consists of the detection, collection and recording of various security-

23、related events in a security audit trail and analysis of those events. Both audit and accountability require that information be recorded. A security audit ensures that sufficient information is recorded about both routine and exceptional events so that later investigations can determine if security

24、 violations have occurred and, if so, what information or other resources have been compromised. Accountability ensures that relevant information is recorded about actions performed by users, or processes acting on their behalf, so that the consequences of those actions can later be linked to the us

25、er) in question, and the user(s) can be held accountable for his or her actions. Provision of a security audit service can contribute to the provision of accountability. A security alarm is a warning issued to an individual or process to indicate that a situation has arisen that may require timely a

26、ction. The purposes of a security alarm service include: - - - to report real or apparent attempts to violate security; to report various security-related events, including “normal” events; and to report events triggered by threshold limits being reached. ii ITU-T Rec. X.816 (1995 E) COPYRIGHT Inter

27、national Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services- - ITU-T RECMN*X*BLb 95 4862593 Ob13404 29b ISO/IEC 10181-7 : 1996 (E) INTERNATIONAL STANDARD ITU-T RECOMMENDATION INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SY

28、STEMS: SECURITY AUDIT AND ALARMS FRAMEWORK 1 Scope This Recommendation I International Standard addresses the application of security services in an Open Systems environment, where the term “Open Systems” is taken to include areas such as Database, Distributed Applications, Open Distributed Processi

29、ng and OSI. The Security Frameworks are concerned with defining the means of providing protection for systems and objects within systems, and with the interactions between systems. The Security Frameworks are not concerned with the methodology for constructing systems or mechanisms. The Security Fra

30、meworks address both data elements and sequences of operations (but not protocol elements) which are used to obtain specific security services. These security services may apply to the communicating entities of systems as well as to data exchanged between systems, and to data managed by systems. The

31、 purpose of security audit and alarms as described in this Recommendation I International Standard is to ensure that open system-security-related events are handled in accordance with the security policy of the applicable security authority. In particular, this framework: a) b) c) defines the basic

32、concepts of security audit and alarms; provides a general model for security audit and alarms; and identifies the relationship of the Security Audit and Alarms service with other security services. As with other security services, a security audit can only be provided within the context of a defined

33、 security policy. The Security Audit and Alarms model provided in clause 6 supports a variety of goals not all of which may be necessary or desired in a particular environment. The security audit service provides an audit authority with the ability to specify the events which need to be recorded wit

34、hin a security audit trail. A number of different types of standard can use this framework including: 1) 2) 3) 4) 5) standards that incorporate the concept of audit and alarms: standards that specify abstract services that include audit and alarms; standards that specify uses of audit and alms; stan

35、dards that specify the means of providing audit and alarms within an open system architecture; and standards that specify audit and alarms mechanisms. Such standards can use this framework as follows: - - - standard types I), 2), 3), 4) and 5) can use the terminology of this framework; standard type

36、s 2), 3), 4) and 5) can use the facilities defined in clause 8; and standard types 5) can be based upon the characteristics of mechanisms defined in clause 9. 2 Normative references The following Recommendations and International Standards contain provisions, which through reference in this text, co

37、nstitute provisions of this Recommendation I International Standard. At the time of publication, the editions indicated were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this ITU-T Rec. X.816 (1995 E) 1 COPYRIGHT International Telecommunication

38、s Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T RECMN*X-BLb 95 9 4Bb25%L 0613405 122 9 ISO/IEC 10181-7 : 1996 (E) Recommendation I International Standard are encouraged to investigate the possibility of applying the most recent edition of the Recommendations and Standard

39、s indicated below. Members of IEC and IS0 maintain registers of currently valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently valid ITU-T Recommendations. 2.1 Identical Recommendations I International Standards - -T Recommendation X.20

40、0 (1994) I ISO/IEC 7498-1:1994, Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model. CCIT Recommendation X.734 (1992) I ISO/IEC 10164-5:1993, Information technology - Open Systems Interconnection - Systems management: Event report management function. CCITT

41、 Recommendation X.735 (1992) I ISO/IEC 10164-6: 1993, Information technology - Open System Interconnection - System management: Log control function. CCIT Recommendation X.736 (1992) I ISO/IEC 10164-7:1992, Infomtion technology - Open Systems Interconnection - Systems management: Security alarm repo

42、rting function. CC Recommendation X.740 (1992) I ISO/IEC 10164-8: 1993, Informtion technology - Open Systems Interconnection - Systems management: Security audit trail function. ITU-T Recommendation X.810 (1995) I ISO/IEC 10181-1:1996, Information technology - Open Systems Interconnection - Security

43、 frameworks for open systems: Overview. - - - - - 2.2 Paired Recommendations I International Standards equivalent in technical content - CCIT Recommendation X.700 (1 992), Managementframework for Open Systems Interconnection (OSI) for CCIlT applications. ISO/IEC 7498-4: 1989, Informution processing

44、systems - Open Systems Interconnection - Basic Reference Model - Part 4: Management framework. CCIT Recommendation X.800 (1991), Security Architecture for Open Systems Interconnection for CCIT applications. IS0 7498-2: 1989, Information processing systems - Open Systems Interconnection - Basic Refer

45、ence Model - Par? 2: Security Architecture. - 3 Definitions For the purposes of this Recommendation I International Standard, the following definitions apply. 3.1 Basic Reference Model definitions . This Recommendation I International Standard makes use of the following terms defined in ITU-T Rec. X

46、.200 I ISO/IEC 7498-1. a) entity; b) facility; c) function; d) service. 3.2 Security architecture definitions This Recommendation I International Standard makes use of the following terms defined in CCTT Rec. X.800 I ISO/IEC 7498-2. a) Accountability; b) Availability; c) Security Audit; d) Security

47、Audit Trail; e) Security Policy. 2 ITU-T Rec. X.816 (1995 E) COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services ITU-T RECMN*X.BLb 75 4862593 ObL34Ob Ob7 = ISO/IEC 10181-7 : 1996 (E) 3.3 Management framework definitions This Recommendation

48、 I International Standard makes use of the following terms defined in CCITT Rec. X.700 I ISOAEC 7498-4: - Managed Object. 3.4 Security framework overview definitions This Recommendation I International Standard makes use of the following terms defined in ITU-T Rec. X.810 I ISOAEC 10181-1. - Security

49、 Domain. 3.5 Additional definitions For the purposes of this Recommendation I International Standard, the following definitions apply. 3.5.1 generates a security audit message. alarm processor: A function which generates an appropriate action in response to a security alarm and 3.5.2 conducting a security audit. audit authority: The manager responsible for defining those aspects of a security policy applicable to 3.5.3 and security audit messages. audit analyser: A function that checks a security audit trail in order to produce, if appropriate, security ala

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1