Registration number (WIID)Project No.TitleStatus
86890ISO/IEC 18033-2:2006/DAmd 2Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2Aptauja
61007ISO/IEC DIS 27028Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributesAptauja
88134ISO/IEC DIS 15408-1Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general modelAptauja slēgta
88135ISO/IEC DIS 15408-2Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional componentsAptauja slēgta
84989ISO/IEC DIS 19896-3Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiersAptauja slēgta
84987ISO/IEC DIS 19896-1Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and conceptsAptauja slēgta
80138ISO/IEC DIS 27404Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoTAptauja slēgta
82878ISO/IEC DIS 27017Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud servicesAptauja slēgta
84988ISO/IEC DIS 19896-2Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validatorsAptauja slēgta
88141ISO/IEC DIS 18045Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluationAptauja slēgta
Displaying 521-530 of 770 results.