ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
61004 | ISO/IEC TS 27022:2021 | Information technology — Guidance on information security management system processes | Standarts spēkā |
61003 | ISO/IEC 27021:2017 | Information technology — Security techniques — Competence requirements for information security management systems professionals | Standarts spēkā |
60804 | ISO/IEC 27034-6:2016 | Information technology — Security techniques — Application security — Part 6: Case studies | Standarts spēkā |
60803 | ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management | Atcelts |
60612 | ISO/IEC 17825:2016 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules | Atcelts |
60475 | ISO/IEC 10118-3:2004/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 | Atcelts |
60412 | ISO/IEC NP 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
60367 | ISO/IEC 9798-4:1999/CD Cor 2 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Izstrādē |
60366 | ISO/IEC 9798-3:1998/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2 | Atcelts |
60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
Displaying 411-420 of 774 results.