Sistema de reacción correlativo en comunicaciones móviles de datos |
En el contexto de las redes móviles, aunque las redes troncales puedan gestionar las amenazas de seguridad, las estaciones móviles que acceden a la red móvil tienen muy poca capacidad de defensa debido a los limitadores recursos hardware. Los equipos vulnerados pueden convertirse fácilmente en agentes de virus y amenazar a toda la red. El sistema de reacción correlativo (CRS) definido en esta Recomendación tiene por finalidad proteger las redes móviles contra las amenazas de terminales inseguros que no cumplen la política de seguridad de la red, tales como los terminales que han sido vulnerados. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9260 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1120-X.1139: Mobile security |
Approval date: |
2008-01-13 |
Provisional name: | X.crs |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1125 (01/2008)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 19 (04/2013)
|
ITU-T X.1120-X.1139 series – Supplement on security aspects of smartphones
|
In force
|
here
|
here
|
here
|
X Suppl. 24 (09/2014)
|
ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices
|
In force
|
here
|
here
|
here
|
X.1125 (2008-01)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|