ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 74207 | ISO/IEC DIS 27034-4 | Information technology — Security techniques — Application security — Part 4: Validation and verification | Standarts spēkā |
| 61007 | ISO/IEC DIS 27028.2 | Information security, cybersecurity and privacy protection — Guidance on using information security control attributes | Aptauja slēgta |
| 39813 | ISO/IEC DIS 20886 | Information technology — International Security, Trust, and Privacy Alliance — Privacy Framework | Izstrādē |
| 77557 | ISO/IEC DIS 18033-3 | IT Security techniques — Encryption algorithms — Part 3: Block ciphers | Standarts spēkā |
| 26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
| 87940 | ISO/IEC DIS 11770-8 | Information security — Key management — Part 8: Password-based key derivation | Aptauja slēgta |
| 88130 | ISO/IEC DIS 11770-4 | Information security — Key management — Part 4: Mechanisms based on weak secrets | Aptauja slēgta |
| 71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
| 81627 | ISO/IEC CD TS 27115 | Cybersecurity evaluation of complex systems — Introduction and framework overview | Izstrādē |
| 84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
Displaying 271-280 of 793 results.
