ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 88141 | ISO/IEC 18045 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation | Izstrādē |
| 88138 | ISO/IEC 15408-4 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities | Izstrādē |
| 85850 | ISO/IEC FDIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 84257 | ISO/IEC FDIS 27000 | Information security, cybersecurity and privacy protection — Information security management systems — Overview | Izstrādē |
| 94003 | ISO/IEC PWI 26599 | Security guidance on interference service based on LLMs | Izstrādē |
| 94004 | ISO/IEC PWI 26601 | Guidance on addressing cybersecurity of Systems-of-Systems | Izstrādē |
| 90011 | ISO/IEC WD 27566-2 | Information security, cybersecurity and privacy protection — Age Assurance Systems — Part 2: Technical approaches and guidance for implementation | Izstrādē |
| 81627 | ISO/IEC CD TS 27115 | Cybersecurity evaluation of complex systems — Introduction and framework overview | Izstrādē |
| 94253 | ISO/IEC AWI 19989-3 | Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detection | Izstrādē |
| 94231 | ISO/IEC PWI 26690 | Consideration of Ascon algorithms in ISO/IEC 29192 series | Izstrādē |
Displaying 671-680 of 807 results.
