ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
43759 | ISO/IEC TR 27019:2013 | Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry | Atcelts |
30816 | ISO/IEC 18031:2005 | Information technology — Security techniques — Random bit generation | Atcelts |
46413 | ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components | Atcelts |
37970 | ISO/IEC 18033-1:2005 | Information technology — Security techniques — Encryption algorithms — Part 1: General | Atcelts |
72515 | ISO/IEC 24759:2017 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
46345 | ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption | Atcelts |
51024 | ISO/IEC 18033-4:2005/Amd 1:2009 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and Decim | Atcelts |
44375 | ISO/IEC 27032:2012 | Information technology — Security techniques — Guidelines for cybersecurity | Atcelts |
45244 | ISO/IEC TR 27008:2011 | Information technology — Security techniques — Guidelines for auditors on information security controls | Atcelts |
59648 | ISO/IEC 27036-1:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts | Atcelts |
Displaying 501-510 of 770 results.