ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 76154 | ISO/IEC 13888-3:2020 | Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniques | Atcelts |
| 76153 | ISO/IEC 13888-1:2020 | Information security — Non-repudiation — Part 1: General | Atcelts |
| 76152 | ISO/IEC PWI 27031 | Information technology Security techniques Guidelines for information and communication technology readiness for business continuity | Izstrādē |
| 76070 | ISO/IEC 27032:2023 | Cybersecurity — Guidelines for Internet security | Standarts spēkā |
| 75948 | ISO/IEC NP TS 23532-2 | IT Security Techniques — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Part 1: Testing and evaluation for ISO/IEC 15408Part 2: Testing for ISO/IEC 19790 | Izstrādē |
| 75652 | ISO/IEC 27002:2022 | Information security, cybersecurity and privacy protection — Information security controls | Standarts spēkā |
| 75304 | ISO/IEC WD 20008-2 | Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key | Standarts spēkā |
| 75302 | ISO/IEC 24745:2022 | Information security, cybersecurity and privacy protection — Biometric information protection | Standarts spēkā |
| 75296 | ISO/IEC 9797-2:2021 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | Standarts spēkā |
| 75295 | ISO/IEC 11770-5:2020 | Information security — Key management — Part 5: Group key management | Atcelts |
Displaying 251-260 of 791 results.
