ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 71120 | ISO/IEC 19896-1:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements | Atcelts |
| 38192 | ISO/IEC 13888-1:2004 | IT security techniques Non-repudiation | Atcelts |
| 43753 | ISO/IEC 27013:2012 | Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 | Atcelts |
| 50482 | ISO/IEC 18014-2:2009 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens | Atcelts |
| 30816 | ISO/IEC 18031:2005 | Information technology — Security techniques — Random bit generation | Atcelts |
| 60803 | ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management | Atcelts |
| 51618 | ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | Atcelts |
| 43759 | ISO/IEC TR 27019:2013 | Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry | Atcelts |
| 34731 | ISO/IEC 21827:2002 | Information technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM®) | Atcelts |
| 71122 | ISO/IEC 19896-3:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators | Atcelts |
Displaying 361-370 of 807 results.
