ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
66232 | ISO/IEC NP 27050-4 | Information technology — Security techniques — Electronic discovery — Part 4: ICT readiness for electronic discovery | Izstrādē |
90717 | ISO/IEC NP 27574 | Information security, cybersecurity and privacy protection — Privacy in brain computer interface (BCI) applications | Izstrādē |
45154 | ISO/IEC NP 29131 | Verification of cryptographic protocols | Izstrādē |
52907 | ISO/IEC NP TR 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
52908 | ISO/IEC NP TR 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
68838 | ISO/IEC NP TR 20004-2 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 — Part 2: CWE and CAPEC based software penetration testing | Izstrādē |
Displaying 561-570 of 774 results.