Bachelor of Information Technology (Cyber and Network Security): ITNET203A Network Security
This guide supports the Diploma of Information Technology, Bachelor of Information Technology (Cyber and Network Security) and Bachelor of Information Technology (Data Engineering).
Includes current Australian and New Zealand standards, draft standards and amendments. Australian Standards are protected by copyright law and a licence agreement. It is possible to set up alerts to keep track of updates to standards.
AS/NZS ISO/IEC 27001:2023 Information technology - Information security, cybersecurity and privacy protection - Information security management systems - Requirements
AS/NZS ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection - Information security controls
AS ISO/IEC 27003:2017 Information technology - Security techniques - Information security management systems - Guidance
AS ISO/IEC 27004:2018 : Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation
AS/NZS ISO/IEC 27005:2012 Information technology - Security techniques - Information security risk management (ISO/IEC 27005:2011, MOD)
AS ISO/IEC 27011:2017 Information technology - Security techniques - Information security control guidelines based on ISO/IEC 27002 for telecommunications organizations
AS ISO/IEC 27035.1:2017 Information technology - Security techniques - Information security incident management, Part 1: Principles of incident management
AS ISO/IEC 27035.2:2017 Information technology - Security techniques - Information security incident management, Part 2: Guidelines to plan and prepare for incident response
AS ISO/IEC 10116:2019 : Information technology - Security techniques – Modes of operation for an n-bit block cipher
AS ISO/IEC 9797.2:2019 Information technology - Security techniques - Message Authentication Codes (MACs), Part 2: Mechanisms using a dedicated hashfunction
AS ISO/IEC 9797.1:2019 Information technology - Security techniques - Message Authentication Codes (MACs), Part 1: Mechanisms using a block cipher