Cybersecurity/Network and Information security

Available (135)

Showing 1 - 12 per page



Godred Fairhurst

Description of Activities

This was a one-shot contribution to provide travel support for participation to the Internet Engineering Task Force (IETF), and specifically participation at the July 2025 plenary meeting in Madrid. I attended this meeting as an Internet Transport expert contributing work and progressing standards to support the evolution of the Internet and its support for enhanced resilience, authentication and privacy. An in-person attendance at the technical sessions also allowed me to progress the work for which I am an editor: Qlog draft-ietf-tsvwg-careful-resume-qlog, a transport specification based on the “qlog” specification being developed by the IETF QUIC; and a recent work item in the IETF Congestion Control working group, “Increase of the Congestion Window when the Sender Is Rate-Limited” (draft-ietf-ccwg-ratelimited-increase). In-person participation at this meeting is particularly important in my current role as an Area Director of the WIT Area, where I will help organise and oversee the meeting as a whole and specifically support the WIT area WG chairs in organising WG sessions and supporting cross area review of emerging specifications.

Country
United Kingdom of Great Britain and Northern Ireland (the)
Impact on society (8th Open Call)
Development of new IETF secure and resilient standards are important for a digital society. Since the last IETF plenary meeting 74 documents had been approved for publication in the last quarter and 83 RFCs had been published. Two new IAB workshops were announced: Joint
IAB/W3C Workshop on Age-Based Restrictions on Content Access and an IAB Workshop on IP Geolocation. The importance of standards was evident in serval meetings co-located with IETF-123. This including meetings with policy and regulators, a meeting on Multi-Stakeholder Forum on Internet Standards Deployment accompanied by an IEPG presentation by Rüdiger Martin of the Internet Governance Team from DG-CNECT, EU. This outlines plans around NIS2, and sought to develop understanding of challenges and barriers, provide timelines for deployments of protocols at scale and best current practice. The transport system is primarily concerned with robustness and resilience to disruption of the Internet service. IETF participants had various insights into the roll-out of new standards and the implications of the new regulatory landscape.
Open Call
Organisation type
Organization
University of Aberdeen
Portrait Picture
Godred Fairhurst
Proposal Title (8th Open Call)
Support for IETF transport protocol standardisation at the July 2025 Plenary Meeting
Standards Development Organisation
StandICT.eu Year
2026

XACML

Cybersecurity, OSI - Open System Interconnections. XACML is expected to address fine grained control of authorized activities, the effect of characteristics of the access requestor, the protocol over which the request is made, authorization based on classes of activities, and content introspection (i.e. authorization based on both the requestor and potentially attribute values within the target where the values of the attributes may not be known to the policy writer). XACML is also expected to suggest a policy authorization model to guide implementers of the authorization mechanism."

OASIS Key Management Interoperability Protocol (KMIP) TC

The OASIS KMIP TC works to define a single, comprehensive protocol for communication between encryption systems and a broad range of new and legacy enterprise applications, including email, databases, and storage devices. By removing redundant, incompatible key management processes, KMIP will provide better data security while at the same time reducing expenditures on multiple products.

OASIS Common Security Advisory Framework (CSAF) TC

The OASIS CSAF Technical Committee is chartered to make a major revision to the Common Vulnerability Reporting Framework (CVRF) under a new name for the framework that reflects the primary purpose: a Common Security Advisory Framework (CSAF). TC deliverables are designed standardize existing practice in structured machine-readable vulnerability-related advisories and further refine those standards over time.

OASIS Privacy Management Reference Model (PMRM) TC

The OASIS PMRM TC works to provide a standards-based framework that will help business process engineers, IT analysts, architects, and developers implement privacy and security policies in their operations. PMRM picks up where broad privacy policies leave off. Most policies describe fair information practices and principles but offer little insight into actual implementation. PMRM provides a guideline or template for developing operational solutions to privacy issues. It also serves as an analytical tool for assessing the completeness of proposed solutions and as the basis for establishing categories and groupings of privacy management controls.

Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015)

This standard provides a guide for the analysis and interpretation of digital data in a way that highlights problems related to continuity, validity, reproducibility and repeatability. It encompasses the best practices for selecting, designing and implementing sufficient information analysis and registration processes to allow processes to be subjected to independent review if necessary. It also provides guidance on the appropriate mechanisms to demonstrate the professionalism and competence of the investigation team.

EN ISO/IEC 27042:2016

Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015)

The standard provides a guideline on the mechanisms to ensure that the methods and processes used in the investigation of information security incidents are "fit for purpose". It contains the best practices regarding the definition of the requirements, the description of the methods, and demonstration of how the implementation of the methods can satisfy the requests. It also includes considerations on how vendors and third parties can be used to help this warranty process.

EN ISO/IEC 27041:2016

Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012)

The standard defines the specific guidelines for the management of digital data which are the identification, collection, acquisition and preservation of digital evidence that can be of probative value. This standard provides guidance to individuals regarding common situations encountered during the processing of digital data and assists organizations in their disciplinary procedures and in facilitating the exchange of potential digital evidence between jurisdictions.

EN ISO/IEC 27037:2016

Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)

The standard provides guidelines for the security standards of organizational information and information security management practices, including the selection, implementation and management of controls, taking into account the risk environment for the security of the organisation information.

EN ISO/IEC 27002:2017

Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016)

This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices. It uses a top down approach, beginning with collecting the most important characteristics of IoT, abstracting those into a generic IoT Conceptual Model, deriving a high level system based reference with subsequent dissection of that model into the four architecture views (functional view, system view, networking view and usage view) from different perspectives.

EN ISO/IEC 27000:2017

Network Functions Virtualisation (NFV) Release 4; Architectural Framework; Report on VNF generic OAM functions

This work item will analyse and define the type of OAM functions for VNFs that can be generalized and be provided as a “generic function” supporting the provisioning, connectivity, configuration and monitoring of VNFs on a virtualized platform. The work item will also determine possible solutions to realize such generic OAM functions, e.g., by leveraging PaaS capabilities. The result report will include, if necessary, recommendations for requirements and architectural enhancements. The resulting deliverable will be informative.