Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 28251 - 28260 de 174019
Technologies de l’information — Techniques de sécurité — Principes et processus d’investigation sur ...
1 Domaine d’application La présente Norme internationale fournit des lignes directrices concernant des modèles idéalisés pour des processus d’investigation des incidents communs à travers divers scénarios d’investigation sur incident impliquant des preuves numériques. Cela inclut des processus allant de la préparation antérieure à l’incident à la clôture de l’investigation, ainsi que tout…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Electronic discovery — Part 3: Code of practice for e...
1 Scope This document provides requirements and guidance on activities in electronic discovery, including, but not limited to, identification, preservation, collection, processing, review, analysis and production of electronically stored information (ESI). In addition, this document specifies relevant measures that span the lifecycle of the ESI from its initial creation through to final…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.030
Information technology — Telecommunications cabling requirements for remote powering of terminal equ...
1 Scope This document a) addresses the support of safety extra low voltage (SELV) and limited power source (LPS) applications that provide remote power over balanced cabling in accordance with the reference implementations of ISO/IEC 11801 series standards using currents per conductor of up to 500 mA and targets the support of applications that provide remote power over balanced cabling to…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.200
Information technology — Security techniques — Code of practice for personally identifiable informat...
1 Scope This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII). In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.030
Information technology — User interfaces — Voice commands — Part 2: Constructing and testing
1 Scope This document provides the technical criterions and test methods of voice commands and its speech recognition engine. The technical criterions include the phonetic requirements for spoken words or phrases that compose the voice command. The test methods verify whether the voice command or speech recognition engine satisfies the required specifications.
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.240.20
Information technology — User interfaces — Voice commands — Part 3: Translation and localization
1 Scope This document contains requirements and recommendations concerning multilingual voice commands and internationalization. This document specifies the linguistic requirements and recommendations for translation and localization of spoken words or phrases for voice commands. This document also includes how to determine the correct words or phrases for voice commands based on the various…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.240.20
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 3850...
1 Scope This document provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of data within their organizations by — applying the governance principles and model of ISO/IEC 38500 to the governance of data, — assuring stakeholders that, if the…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.020
Information technology — Security techniques — Governance of information security
1 Scope This Recommendation | International Standard provides guidance on concepts and principles for the governance of information security, by which organisations can evaluate, direct, monitor and communicate the information security related activities within the organisation. This International Standard is applicable to all types and sizes of organisations
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.040
Information technology — Security techniques — Competence requirements for information security mana...
1 Scope This document specifies the requirements of competence for ISMS professionals leading or involved in establishing, implementing, maintaining and continually improving one or more information security management system processes that conforms to ISO/IEC 27001.
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
03.100.70; 35.030
Information technology — Security techniques Part 2: Guidelines for the design and implementation of...
1 Scope This part of ISO/IEC 27033 gives guidelines for organizations to plan, design, implement and document network security.
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.040

Spacer