ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 59144 | ISO/IEC 27006:2011 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
| 59648 | ISO/IEC 27036-1:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts | Atcelts |
| 59649 | ISO/IEC 18033-3:2010/WD Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Russian Block Cipher GOST | Izstrādē |
| 59680 | ISO/IEC 27036-2:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements | Atcelts |
| 59688 | ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security | Atcelts |
| 59689 | ISO/IEC 27036-4:2016 | Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services | Standarts spēkā |
| 59934 | ISO/IEC 18014-4:2015 | Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources | Standarts spēkā |
| 59948 | ISO/IEC 18033-5:2015 | Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers | Standarts spēkā |
| 59994 | ISO/IEC 10118-2:2010/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1 | Standarts spēkā |
| 60029 | ISO/IEC NP 17547 | Information technology — Security techniques — Guidelines for analysis & interpretation of digital evidence | Izstrādē |
Displaying 341-350 of 791 results.
