ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
67397 | ISO/IEC TS 27008:2019 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Standarts spēkā |
67173 | ISO/IEC 29192-5:2016 | Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions | Standarts spēkā |
67116 | ISO/IEC 10118-3:2018 | IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions | Standarts spēkā |
67115 | ISO/IEC 9798-3:2019 | IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques | Standarts spēkā |
67114 | ISO/IEC 9798-2:2019 | IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption | Standarts spēkā |
67001 | ISO/IEC NP 20085 | Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules | Izstrādē |
66806 | ISO/IEC 27002:2013/Cor 1:2014 | Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1 | Atcelts |
66805 | ISO/IEC 27001:2013/Cor 1:2014 | Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 1 | Standarts spēkā |
66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
Displaying 331-340 of 774 results.