ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 92416 | ISO/IEC CD 27007 | Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing | Izstrādē |
| 91840 | ISO/IEC WD 25888 | Information Security — Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
| 89525 | ISO/IEC WD 27573 | Privacy protection of user avatar and system avatar interactions in the metaverse | Izstrādē |
| 83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 66525 | ISO/IEC NP 19896 | Information technology — Security techniques — Competence requirements for information security testers and evaluators | Izstrādē |
| 38740 | ISO/IEC 15408-3:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements — Technical Corrigendum 1 | Izstrādē |
| 52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 92749 | ISO/IEC AWI 26160 | Information security, cybersecurity and privacy protection — Enhancing the ISO/IEC 15408 series and ISO/IEC 18045 for the Evaluation of Artificial Intelligence (AI) Functionality | Izstrādē |
| 82883 | ISO/IEC PWI 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
| 80397 | ISO/IEC NP TS 27564 | Privacy — Guidance on the use of models for engineering | Izstrādē |
Displaying 161-170 of 793 results.
