ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 56890 | ISO/IEC TS 30104:2015 | Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements | Standarts spēkā |
| 83534 | ISO/IEC TS 9569:2023 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045 | Standarts spēkā |
| 30032 | ISO/IEC WD 10118-4 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic | Izstrādē |
| 19682 | ISO/IEC WD 11765 | Security information objects | Izstrādē |
| 19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
| 26955 | ISO/IEC WD 11768-1 | Information technology security techniques — Security mechanisms using zero knowledge techniques — Part 1: General model of security evaluation | Izstrādē |
| 19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
| 25538 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Cryptographic separation | Izstrādē |
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 23706 | ISO/IEC WD 14516-1 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 1: General overview | Izstrādē |
Displaying 741-750 of 791 results.
