ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
51586 | ISO/IEC NP 27033-7 | Information technology — Security techniques — Network security — Part 7: Wireless | Izstrādē |
55584 | ISO/IEC NP 27034-4 | Information technology — Security techniques — Application security — Part 4: Application security validation | Standarts spēkā |
44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
66232 | ISO/IEC NP 27050-4 | Information technology — Security techniques — Electronic discovery — Part 4: ICT readiness for electronic discovery | Izstrādē |
89525 | ISO/IEC NP 27573 | Privacy protection of user avatar and system avatar interactions in the metaverse | Izstrādē |
45154 | ISO/IEC NP 29131 | Verification of cryptographic protocols | Izstrādē |
52907 | ISO/IEC NP TR 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
52908 | ISO/IEC NP TR 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
Displaying 561-570 of 770 results.