ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 53247 | ISO/IEC WD TR 30127 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
| 73909 | ISO/IEC WD 29115.4 | Information technology — Security techniques — Entity authentication assurance framework | Izstrādē |
| 19682 | ISO/IEC WD 11765 | Security information objects | Izstrādē |
| 60103 | ISO/IEC NP 17598 | Investigation principles and processes | Izstrādē |
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 84249 | ISO/IEC 29134:2017/DAmd 1 | Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1 | Izstrādē |
| 82887 | ISO/IEC PWI 27045 | Cybersecurity — Big data security and privacy — Guidelines for managing big data risks | Izstrādē |
| 82882 | ISO/IEC PWI 7680 | Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators | Izstrādē |
| 80397 | ISO/IEC NP TS 27564 | Privacy — Guidance on the use of models for engineering | Izstrādē |
| 61008 | ISO/IEC CD TR 27029 | additional document for ISO/IEC 27002 and ISO and IEC standards | Izstrādē |
Displaying 81-90 of 791 results.
