ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 50678 | ISO/IEC 18014-1:2008 | Information technology — Security techniques — Time-stamping services — Part 1: Framework | Atcelts |
| 46542 | ISO/IEC 11770-3:2008 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
| 59680 | ISO/IEC 27036-2:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements | Atcelts |
| 31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
| 44407 | ISO/IEC 27043:2015 | Information technology — Security techniques — Incident investigation principles and processes | Atcelts |
| 63411 | ISO/IEC 27000:2014 | Information technology Security techniques Information security management systems Overview and vocabulary | Atcelts |
| 44374 | ISO/IEC 27031:2011 | Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity | Atcelts |
| 19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
| 74033 | ISO/IEC 27035-3:2020 | Information technology — Information security incident management — Part 3: Guidelines for ICT incident response operations | Atcelts |
| 77582 | ISO/IEC 24760-1:2019 | IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts | Atcelts |
Displaying 341-350 of 793 results.
