ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
| 81627 | ISO/IEC CD TS 27115 | Cybersecurity evaluation of complex systems — Introduction and framework overview | Izstrādē |
| 87375 | ISO/IEC CD TS 5689 | Cybersecurity — Security frameworks and use cases for cyber physical systems | Izstrādē |
| 71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
| 88130 | ISO/IEC DIS 11770-4 | Information security — Key management — Part 4: Mechanisms based on weak secrets | Aptauja slēgta |
| 87940 | ISO/IEC DIS 11770-8 | Information security — Key management — Part 8: Password-based key derivation | Aptauja slēgta |
| 26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
| 77557 | ISO/IEC DIS 18033-3 | IT Security techniques — Encryption algorithms — Part 3: Block ciphers | Standarts spēkā |
| 39813 | ISO/IEC DIS 20886 | Information technology — International Security, Trust, and Privacy Alliance — Privacy Framework | Izstrādē |
| 88971 | ISO/IEC DIS 25093-1 | Cybersecurity — Confidential computing — Part 1: Overview and concepts | Izstrādē |
Displaying 521-530 of 807 results.
