ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
73207 | ISO/IEC 11770-2:2018 | IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques | Standarts spēkā |
73205 | ISO/IEC 18033-3:2010/DAmd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Kuznyechik | Izstrādē |
72917 | ISO/IEC 15408-5:2022 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Standarts spēkā |
72913 | ISO/IEC 15408-4:2022 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities | Standarts spēkā |
72906 | ISO/IEC 15408-3:2022 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components | Standarts spēkā |
72892 | ISO/IEC 15408-2:2022 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components | Standarts spēkā |
72891 | ISO/IEC 15408-1:2022 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Standarts spēkā |
72890 | ISO/IEC TR 22216:2022 | Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022 | Standarts spēkā |
72889 | ISO/IEC 18045:2022 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation | Standarts spēkā |
72515 | ISO/IEC 24759:2017 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
Displaying 261-270 of 774 results.