没有合适的资源?快使用搜索试试~ 我知道了~
ISO-IEC JTC 1-SC 27-WG 4_N6380_Proposal by SDST
需积分: 5 0 下载量 176 浏览量
2023-09-13
17:31:38
上传
评论
收藏 306KB PDF 举报
温馨提示
试读
20页
ISO-IEC JTC 1-SC 27-WG 4_N6380_Proposal by CN PWI Stealthy Defense Security Technologies (SDST)
资源推荐
资源详情
资源评论
ISO/IEC JTC 1/SC 27/WG 4 N 6380
ISO/IEC JTC 1/SC 27/WG 4 "Security controls and services"
Convenorship: ILNAS
Convenor: Amsenga Johann Mr
Proposal by CN PWI Stealthy Defense Security Technologies (SDST)
Document type Related content Document date Expected action
Project / Draft Meeting: VIRTUAL 16 Oct 2023 2023-08-28 INFO
ISO#####-#:####(X)
ISOTC###/SC##/WG#
Date: YYYY-MM-DD
Information Security, Cyber Security and Privacy Protection—
Stealthy Defense Security Technologies (SDST)— Overview
PWI Proposal
Warning for WDs and CDs
This document is not an ISO International Standard. It is distributed for review and comment. It is subject to change
without notice and may not be referred to as an International Standard.
Recipients of this draft are invited to submit, with their comments, notification of any relevant patent rights of which
they are aware and to provide supporting documentation.
A model manuscript of a draft International Standard (known as “The Rice Model”) is available at
https://www.iso.org/iso/model_document-rice_model.pdf
© ISO2023– All rights reserved
ISO#####-#:####(X)
© ISO 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this
publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including
photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be
requested from either ISO at the address below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO####– All rights reserved
ISO#####-#:####(X)
Contents
Foreword...................................................................................................................................................................... v
Introduction............................................................................................................................................................... vi
1 Scope.................................................................................................................................................................... 1
2 Terms and definitions..................................................................................................................................... 1
For the purposes of this document, the following terms and definitions apply....................................1
2.1 1
2.2 1
2.3 1
3 Acronyms and Abbreviations...................................................................................................................... 1
4 Normative Reference...................................................................................................................................... 2
5 SCA Literature Review................................................................................................................................... 2
5.1 SCA in ISO/IEC Literature................................................................................................................................ 2
5.1.1 ISO/IEC Standards related to SCA........................................................................................................... 2
5.1.2 ISO N numbered Documents related to SCA........................................................................................ 3
5.2 ITU-T documents related to SCA................................................................................................................... 4
5.2.1 SCA in ITU-T Standards.............................................................................................................................. 4
5.2.2 ITU-T meeting documents related to SCA............................................................................................ 5
5.3 SCA in Academic and Industry literature................................................................................................... 5
5.3.1 Literature survey......................................................................................................................................... 5
5.3.2 Views on SCA................................................................................................................................................. 5
5.3.3 Status of responses..................................................................................................................................... 5
5.3.4 Limitations.................................................................................................................................................... 5
5.4 Conclusions from Literature Review........................................................................................................... 5
5.4.1 Some general observations...................................................................................................................... 5
5.4.2 ISO/IEC views on SCA threat.................................................................................................................... 6
5.4.3 ISO/IEC Literature on SCA responses.................................................................................................... 6
6 SCA Overview.................................................................................................................................................... 6
6.1 Common Attacks and Stealthy Attacks....................................................................................................... 6
6.2 How to distinguish common from stealthy attacks................................................................................. 6
6.3 Common attacks become stealthy attacks................................................................................................. 6
6.4 Examples of common attacks evolving into stealthy attacks...............................................................6
6.5 Categorization and Classification of SCA.................................................................................................... 6
7 SCA techniques................................................................................................................................................ 6
© ISO####– All rights reserved iii
剩余19页未读,继续阅读
资源评论
love6a6
- 粉丝: 494
- 资源: 92
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于python区块链的图片版权保护系统
- 一些常用的 Redis 基本命令以及它们的使用用例
- 一个简单的 Python 代码示例,演示了如何实现树状数组(也称为二进制索引树)
- 最新USB转vga hdmi驱动Fresco logic FL2000-2.1.36287驱动
- 基于原生语言开发的智慧养老微信小程序(只含页面)
- 课程设计基于sort+knn实现高空抛物演示python源码+演示视频.7z
- 基于Java的万年历源代码
- halcon检测表面的缺陷例子
- 基于LabView+MATLAB的说话人识别系统
- 基于Flask Web的中文自动语音识别演示系统,包含语音识别、语音合成、声纹识别之说话人识别
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功