ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
56590 | ISO/IEC 27099:2022 | Information technology — Public key infrastructure — Practices and policy framework | Standarts spēkā |
64014 | ISO/IEC 27034-1:2011/Cor 1:2014 | Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1 | Standarts spēkā |
51619 | ISO/IEC 9797-3:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function | Standarts spēkā |
51581 | ISO/IEC 27033-2:2012 | Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security | Standarts spēkā |
71672 | ISO/IEC 27554:2024 | Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment of identity-related risk | Standarts spēkā |
82908 | ISO/IEC 27006-1:2024 | Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General | Standarts spēkā |
62544 | ISO/IEC 18370-2:2016 | Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms | Standarts spēkā |
71670 | ISO/IEC 27701:2019 | Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines | Standarts spēkā |
44406 | ISO/IEC 27042:2015 | Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence | Standarts spēkā |
51583 | ISO/IEC 27033-4:2014 | Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways | Standarts spēkā |
Displaying 11-20 of 770 results.