ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
62325 | ISO/IEC 15946-5:2009/Cor 1:2012 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1 | Atcelts |
62313 | ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
62290 | ISO/IEC TS 29003:2018 | Information technology — Security techniques — Identity proofing | Standarts spēkā |
62289 | ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment | Atcelts |
62288 | ISO/IEC 18370-1:2016 | Information technology — Security techniques — Blind digital signatures — Part 1: General | Standarts spēkā |
62287 | ISO/IEC WD 27044 | Guidelines for Security Information and Event Management (SIEM) | Standarts spēkā |
62286 | ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing | Standarts spēkā |
62073 | ISO/IEC 18033-3:2010/NP Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1 | Izstrādē |
62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
62071 | ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response | Atcelts |
Displaying 391-400 of 774 results.