Identification cards — Identification of issuers — Part 1: Numbering system
1 Scope
This document specifies a numbering system for the identification of the card issuers, the format of the issuer identification number (IIN) and the primary account number (PAN).
Identification cards — Identification of issuers — Part 2: Application and registration procedures
1 Scope
This document specifies the application and registration procedures for Issuer Identification Numbers (IINs) issued in accordance with ISO/IEC 7812-1.
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
The scope of this standard is to define a protocol and management elements, suitable for advertising
information to stations attached to the same IEEE 802 LAN, for the purpose of populating physical topology
and device discovery management information databases. The protocol facilitates the identification of
stations connected by IEEE 802 LANs/MANs, their points of interconnection,…
Information technology — Security techniques — Application security — Part 5: Protocols and applicat...
1 Scope
This document outlines and explains the minimal set of essential attributes of ASCs and details the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM).
Information technology — Security techniques — Information security for supplier relationships — Par...
1 Scope
This part of ISO/IEC 27036 is an introductory part of ISO/IEC 27036. It provides an overview of the
guidance intended to assist organizations in securing their information and information systems within
the context of supplier relationships. It also introduces concepts that are described in detail in the
other parts of ISO/IEC 27036. This part of ISO/IEC 27036 addresses perspectives…
Information technology — Security techniques — Information security for supplier relationships — Par...
1 Scope
This part of ISO/IEC 27036 specifies fundamental information security requirements for defining,
implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer
relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing
or assembly, business process procurement, software and hardware components,…
Information technology — Security techniques — Guidelines for identification, collection, acquisitio...
1
Scope
This International Standard provides guidelines for specific activities in handling digital evidence, which are identification, collection, acquisition and preservation of digital evidence that may be of evidential value. This International Standard provides guidance to individuals with respect to common situations encountered throughout the digital evidence handling process and assists…
Technologies de l’information — Techniques de sécurité — Lignes directrices pour l’identification, l...
1 Domaine d’application
La présente Norme internationale fournit des lignes directrices pour les activités spécifiques au traitement des preuves numériques que sont l’identification, la collecte, l’acquisition et la préservation des preuves numériques susceptibles de présenter une valeur probatoire. La présente Norme internationale fournit des préconisations aux personnes concernant des…
Information technology — Security techniques — Specification for digital redaction
1 Scope
This International Standard specifies characteristics of techniques for performing digital redaction on
digital documents. This International Standard also specifies requirements for software redaction tools
and methods of testing that digital redaction has been securely completed.
This International Standard does not include the redaction of information from databases.
Technologies de l’information — Techniques de sécurité — Spécifications concernant l’expurgation num...
1 Domaine d’application
La présente Norme internationale spécifie les caractéristiques des techniques d’expurgation numérique de documents numériques. La présente Norme internationale spécifie également les exigences concernant les outils d’expurgation logiciels et les méthodes d’essai permettant d’assurer que l’expurgation numérique a été réalisée de façon sûre.
La présente Norme…