Difference between revisions of "Cybersecurity Frameworks, Architectures & Roadmaps"

From
Jump to: navigation, search
Line 13: Line 13:
 
* [http://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Standards FIPS 140-2 Security Requirements for Cryptographic Modules]
 
* [http://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Standards FIPS 140-2 Security Requirements for Cryptographic Modules]
 
* [http://securityintelligence.com/how-stix-taxii-and-cybox-can-help-with-standardizing-threat-information/ How STIX, TAXII and CybOX Can Help With Standardizing Threat Information]  
 
* [http://securityintelligence.com/how-stix-taxii-and-cybox-can-help-with-standardizing-threat-information/ How STIX, TAXII and CybOX Can Help With Standardizing Threat Information]  
* [http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=cti OASIS Cyber Threat Intelligence (CTI) TC]
+
* [http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=cti OASIS Cyber Threat Intelligence (CTI) TC] [http://openc2.org/ OpenC2]
 
* [http://www.dhs.gov/using-cybersecurity-framework Using the Cybersecurity Framework]
 
* [http://www.dhs.gov/using-cybersecurity-framework Using the Cybersecurity Framework]
  

Revision as of 22:02, 31 July 2018