ISO/IEC JTC 1/SC 27
| Reģistrācijas numurs (WIID) | Projekta Nr. | Nosaukums | Statuss |
|---|---|---|---|
| 42508 | ISO/IEC 27009:2016 | Technologies de l'information — Techniques de sécurité — Application de l’ISO/IEC 27001 à un secteur spécifique — Exigences | Atcelts |
| 42509 | ISO/IEC 27010:2012 | Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications | Atcelts |
| 64143 | ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations | Atcelts |
| 41531 | ISO/IEC 24761:2009 | Information technology — Security techniques — Authentication context for biometrics | Atcelts |
| 50341 | ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model | Atcelts |
| 50341 | ISO/IEC 15408-1:2009 | Informācijas tehnoloģija - Drošības metodes - Kritēriji informācijas tehnoloģiju drošības novērtēšanai - 1.daļa: Ievads un vispārējais modelis | Atcelts |
| 18102 | ISO/IEC 10116:1991 | Technologies de l'information — Modes opératoires d'un algorithme de chiffrement par blocs de n-bits | Atcelts |
| 59680 | ISO/IEC 27036-2:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements | Atcelts |
| 84248 | ISO/IEC 24760-1:2019/Amd 1:2023 | Sécurité IT et confidentialité — Cadre pour la gestion de l'identité — Partie 1: Terminologie et concepts — Amendement 1 | Atcelts |
| 46542 | ISO/IEC 11770-3:2008 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
Attēlo no 351. līdz 360. no pavisam 791 ieraksta(-iem).
