ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
84242 | ISO/IEC CD TS 27008.2 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
89319 | ISO/IEC CD TS 27564 | Privacy protection - Guidance on the use of models for privacy engineering | Izstrādē |
71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
88134 | ISO/IEC DIS 15408-1 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Aptauja slēgta |
88135 | ISO/IEC DIS 15408-2 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components | Aptauja slēgta |
88136 | ISO/IEC DIS 15408-3 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components | Aptauja slēgta |
88138 | ISO/IEC DIS 15408-4 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities | Aptauja slēgta |
88140 | ISO/IEC DIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Aptauja slēgta |
77557 | ISO/IEC DIS 18033-3 | IT Security techniques — Encryption algorithms — Part 3: Block ciphers | Standarts spēkā |
Displaying 501-510 of 770 results.