ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
82894 | ISO/IEC 27706 | Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of privacy information management systems | Izstrādē |
82888 | ISO/IEC PWI 7699 | Guidance for addressing security threats and failures in artificial intelligence | Izstrādē |
25538 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Cryptographic separation | Izstrādē |
28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
38852 | ISO/IEC NP 24742 | Information technology — Information security management metrics and measurements | Izstrādē |
60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
67001 | ISO/IEC NP 20085 | Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules | Izstrādē |
66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
Displaying 641-650 of 774 results.