ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 82873 | ISO/IEC 27001:2013/DAmd 1 | Information technology — Security techniques — Information security management systems — Requirements — Amendment 1 | Izstrādē |
| 82888 | ISO/IEC PWI 7699 | Guidance for addressing security threats and failures in artificial intelligence | Izstrādē |
| 25538 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Cryptographic separation | Izstrādē |
| 28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
| 29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
| 38852 | ISO/IEC NP 24742 | Information technology — Information security management metrics and measurements | Izstrādē |
| 60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
| 66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
| 67001 | ISO/IEC NP 20085 | Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules | Izstrādē |
| 66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
Displaying 661-670 of 791 results.
