ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
66558 | ISO/IEC 18031:2011/Cor 1:2014 | Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 | Atcelts |
66670 | ISO/IEC NP TS 14516-1 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 1: Overview and concepts | Izstrādē |
66671 | ISO/IEC NP TS 14516-2 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 2: Guidelines on information security for CA trust service providers | Izstrādē |
66672 | ISO/IEC NP TS 14516-3 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 3: Guidelines on information security for PKI trust service providers | Izstrādē |
66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
66805 | ISO/IEC 27001:2013/Cor 1:2014 | Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 1 | Standarts spēkā |
66806 | ISO/IEC 27002:2013/Cor 1:2014 | Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1 | Atcelts |
67001 | ISO/IEC NP 20085 | Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules | Izstrādē |
67114 | ISO/IEC 9798-2:2019 | IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption | Standarts spēkā |
Displaying 431-440 of 770 results.