Temporary Documents
�(PLEN)
�[�AI/Question:�Q4/17�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 657-PLEN ]
�
(Rev.1)� |
LS/o/r on Referencing 3 new ETSI ISG ISI specifications in the list of CYBEX techniques
�
� |
ITU-T Study Group 17
� |
Q4/17
� |
2013-09-02 |
|
[ 656-PLEN ]
�
(Rev.1-2)� |
LS/o/r on submission of OASIS CAP v1.2
�
� |
ITU-T Study Group 17
� |
Q4/17, Q11/17
� |
2013-09-02 |
|
[ 654-PLEN ]
�
� |
A.5 justification information for draft new Recommendation ITU-T X.maec
�
� |
Rapporteur Q4/17
� |
Q4/17
� |
2013-09-02 |
|
[ 614-PLEN ]
�
� |
Suggested update to the CYBEX webpage and NFVO webpage
�
� |
Rapporteur Q4/17 (Cybersecurity)
� |
Q4/17
� |
2013-08-30 |
|
[ 606-PLEN ]
�
� |
Joint meeting of Q1/17 and Q4/17 on terms and definitions
�
� |
Rapporteur Q4/17
� |
Q4/17, Q1/17
� |
2013-08-30 |
|
[ 589-PLEN ]
�
(Rev.1-3)� |
The 9th revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of source based security troubleshooting mechanisms for Internet Protocol-based networks
�
� |
X.trm Editors
� |
Q4/17
� |
2013-08-29 |
|
[ 587-PLEN ]
�
� |
Recommendation X.1500 (2011) Amendment 4, Overview of cybersecurity information exchange (CYBEX), (for approval)
�
� |
Rapporteur Q4/17
� |
Q4/17
� |
2013-08-28 |
|
[ 583-PLEN ]
�
(Rev.1-2)� |
Baseline text for draft Recommendation X.cap, Common Alerting Protocol 1.2
�
� |
Rapporteur Q4/17
� |
Q4/17
� |
2013-08-28 |
|
[ 582-PLEN ]
�
� |
Agenda for Question 3/17 and Q10/17 joint meeting
�
� |
Q3/17 and Q10/17 Rapporteur
� |
Q4/17, Q3/17
� |
2013-08-28 |
|
[ 576-PLEN ]
�
� |
Q4/17 comments to Contribution 116, NWI proposal on "Interaction of the IP-based National security center of the public telecommunications network with the security management systems of national operators for developing countries"
�
� |
Rapporteur Q4/17
� |
Q4/17
� |
2013-08-27 |
|
[ 575-PLEN ]
�
� |
LS/i on Text 2nd WD 27044 - Text for ISO/IEC 2nd WD 27044, Information technology - Security techniques - Guidelines for security information and event management (SIEM) [N12677 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q4/17, Q3/17
� |
2013-08-27 |
|
[ 573-PLEN ]
�
� |
Draft Recommendation ITU-T X.maec, Malware attribute enumeration and characterization (for determination)
�
� |
Q4/17 Rapporteur
� |
Q4/17
� |
2013-08-27 |
|
[ 568-PLEN ]
�
� |
Agenda for Q3/17 and Q4/17 joint meeting
�
� |
Q3/17 and Q4/17 Rapporteur
� |
Q4/17, Q3/17
� |
2013-08-27 |
|
[ 566-PLEN ]
�
� |
Initial allocation of Liaison Statements from ISO/IEC JTC1/SC27 to Question(s)
�
� |
Vice-Chairman SG17, Liaison officer SC27
� |
QALL/17, Q8/17, Q4/17, Q3/17, Q2/17, Q11/17, Q10/17, Q1/17
� |
2013-08-26 |
|
[ 560-PLEN ]
�
� |
Japan's answer to the TAP consultation on draft new Recommendation X.1208 "Guideline for cybersecurity index." - TSB Circular 24
�
� |
TSB
� |
Q4/17, (QALL/17)
� |
2013-08-13 |
|
[ 549-PLEN ]
�
� |
Introduction to 3rd Cyber Space conference, Seoul, 17 - 18 October 2013
�
� |
SG17 Vice chairman
� |
Q4/17, (QALL/17)
� |
2013-07-22 |
|
[ 548-PLEN ]
�
(Rev.1)� |
ITU-T Recommendations referencing withdrawn ISO/IEC standards
�
� |
TSB
� |
Q9/17, Q6/17, Q4/17, Q3/17, Q2/17, Q11/17, Q1/17, (QALL/17)
� |
2013-07-22 |
|
[ 545-PLEN ]
�
� |
LS/i on ISO/IEC 2nd CD 27043 - Information technology -- Security techniques - Incident investigation principles and processes [N12687 from ISO/IEC JTC 1/SC27
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 543-PLEN ]
�
� |
LS/i on 3rd WD 27035-3 - Text for ISO/IEC 3rd WD 27035-3, - Security techniques - Information security incident management - Part 3: Guidelines for incident response operations [N12672 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 542-PLEN ]
�
� |
LS/i on 3rd WD 27035-2 - Text for ISO/IEC 3rd WD 27035-2, Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response [N12670 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 541-PLEN ]
�
� |
LS/i on 3rd WD 27035-1 - Text for ISO/IEC 3rd WD 27035-1, Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management [N12668 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 539-PLEN ]
�
� |
LS/i on Text for ISO/IEC DIS 27039 - Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) [N12689 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 538-PLEN ]
�
� |
LS/i on ISO/IEC 2nd CD 27042 - Information technology -- Security techniques - Guidelines for the analysis and interpretation of digital evidence [N12685 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 537-PLEN ]
�
� |
LS/i on ISO/IEC CD 27041 - Information technology -- Security techniques - Guidance on assuring suitability and adequacy of incident investigation methods [N12683 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 534-PLEN ]
�
� |
LS/i on Liaison Statement to ITU-T SG 17 [N12518 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
WP1/17, Q9/17, Q8/17, Q4/17, Q10/17, Q1/17, (QALL/17), (Q3/17)
� |
2013-07-22 |
|
[ 527-PLEN ]
�
(Rev.1)� |
Draft revised Recommendation ITU-T X.1526 (X.oval), Open vulnerability and assessment language (for determination)
�
� |
Q4/17 Rapporteur
� |
Q4/17
� |
2013-07-15 |
|
[ 526-PLEN ]
�
(Rev.1)� |
Draft revised Recommendation ITU-T X.1520 (X.cve), Common vulnerabilities and exposures (for determination)
�
� |
Q4/17 Rapporteur
� |
Q4/17
� |
2013-07-15 |
|
[ 525-PLEN ]
�
� |
Draft Recommendation ITU-T X.maec, Malware attribute enumeration and characterization (for determination)
�
� |
Q4/17 Rapporteur
� |
Q4/17
� |
2013-07-15 |
|
[ 523-PLEN ]
�
(Rev.1)� |
Tutorial: ETSI ISG ISI Standardization
�
� |
SG17 Chairman
� |
Q4/17, Q3/17, (QALL/17)
� |
2013-07-08 |
|
[ 522-PLEN ]
�
� |
LS/o on ISI Indicators and ISI Event Model [to ETSI ISG ISI]
�
� |
ITU-T SG17 Question 4 (2-3 July 2013, virtual)
� |
Q4/17, Q3/17
� |
2013-07-05 |
|
[ 514-PLEN ]
�
� |
LS/i/r on Referencing 3 new ETSI ISG ISI specifications in the list of CYBEX techniques [from ETSI ISG ISI]
�
� |
ETSI ISG ISI chairman
� |
Q4/17
� |
2013-06-25 |
|
[ 512-PLEN ]
�
� |
Maintenance responsibility of SG17 webpages
�
� |
TSB
� |
Q4/17, Q12/17, Q11/17, Q10/17, Q1/17
� |
2013-06-18 |
|
[ 509-PLEN ]
�
� |
Highlights of the June 2013 Review Committee meeting of significance to SG17
�
� |
TSB
� |
Q9/17, Q8/17, Q6/17, Q5/17, Q4/17, Q3/17, Q2/17, Q1/17
� |
2013-06-27 |
|
[ 501-PLEN ]
�
� |
TSB edits to: The 9th revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks (for determination)
�
� |
TSB
� |
Q4/17
� |
2013-05-10 |
|
[ 499-PLEN ]
�
� |
TSB edits to: Draft Recommendation ITU-T X.maec, Malware attribute enumeration and characterization
�
� |
TSB
� |
Q4/17
� |
2013-07-15 |
|
[ 496-PLEN ]
�
(Rev.1)� |
Enhancing cybersecurity in least developed countries
�
� |
TSB
� |
QALL/17, Q4/17
� |
2013-08-23 |
|
[ 490-PLEN ]
�
(Rev.1)� |
List of proposed new work items for SG17 and list of work items to be deleted/modified
�
� |
TSB
� |
Q7/17, Q6/17, Q4/17, Q11/17, Q10/17, (QALL/17)
� |
2013-08-15 |
|
[ 485-PLEN ]
�
� |
Highlights of the June 2013 TSAG meeting as of significance to SG17
�
� |
TSB
� |
Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17, Q2/17Q3/17, Q1/17
� |
2013-07-04 |
|
[ 481-PLEN ]
�
� |
Reply results to TSB Circular
�
� |
TSB
� |
QALL/17, Q4/17, (Q10/17)
� |
2013-08-16 |
|
[ 466-PLEN ]
�
(Rev.1)� |
Outcome of GSC-17 of interest to SG17
�
� |
TSB
� |
Q9/17, Q8/17, Q6/17, Q4/17, Q3/17, Q10/17, (QALL/17)
� |
2013-05-23 |
|
[ 456-PLEN ]
�
� |
LS/i on submission of OASIS CAP v1.2 [to ITU-T SG17]
�
� |
OASIS
� |
Q4/17, (Q11/17)
� |
2013-05-10 |
|
[ 455-PLEN ]
�
� |
Communication from ETSI ISG ISI chairman to SG17 on ETSI ISG ISI specifications
�
� |
TSB
� |
Q4/17
� |
2013-05-10 |
|
[ 444-PLEN ]
�
� |
Summaries of Recommendations under development in Q4/17
�
� |
Rapporteur Q4/17
� |
Q4/17
� |
2013-05-09 |
|
[ 440-PLEN ]
�
� |
Outcome of Emergency Alerting Policy Workshop, 23-24 April 2013, Geneva/Switzerland
�
� |
TSB
� |
Q4/17
� |
2013-07-22 |
|
[ 434-PLEN ]
�
� |
Report of Q4/17 interim Rapporteur meeting (2-3 July 2013)
�
� |
Rapporteur Q4/17 (Cybersecurity)
� |
Q4/17
� |
2013-05-09 |
|
[ 430-PLEN ]
�
(Rev.1-2)� |
Report of special session on revision of Question texts (MON 26 August 2013, 18:00 - 19:30)
�
� |
SG17
� |
Qall/17, Q6/17, Q4/17, Q3/17, Q11/17
� |
2013-05-09 |
|
[ 422-PLEN ]
�
(Rev.1)� |
WP2/17 report
�
� |
WP2/17 chairman
� |
Q5/17, Q4/17
� |
2013-05-09 |
|
[ 415-PLEN ]
�
� |
Report of the Correspondence Group on Cybersecurity Information Exchange Capabilities (CG-CYBEX), Apr - Aug 2013
�
� |
Convenor, CYBEX Correspondence Group
� |
Q4/17
� |
2013-07-15 |
|
[ 404-PLEN ]
�
(Rev.1-2)� |
Report of Q4/17
�
� |
Rapporteur Q4/17
� |
Q4/17
� |
2013-05-09 |
|
[ 399-PLEN ]
�
� |
The 8th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
�
� |
X.eipwa Editors
� |
Q4/17
� |
2013-05-09 |
Results:55 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):