Information technology — Telecommunications cabling requirements for remote powering of terminal equ...
1 Scope
This document
a) addresses the support of safety extra low voltage (SELV) and limited power source (LPS)
applications that provide remote power over balanced cabling in accordance with the
reference implementations of ISO/IEC 11801 series standards using currents per
conductor of up to 500 mA and targets the support of applications that provide remote
power over balanced cabling to…
Information technology — Security techniques — Code of practice for personally identifiable informat...
1 Scope
This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into…
Information technology — User interfaces — Voice commands — Part 2: Constructing and testing
1 Scope
This document provides the technical criterions and test methods of voice commands and its speech recognition engine.
The technical criterions include the phonetic requirements for spoken words or phrases that compose the voice command.
The test methods verify whether the voice command or speech recognition engine satisfies the required specifications.
Information technology — User interfaces — Voice commands — Part 3: Translation and localization
1 Scope
This document contains requirements and recommendations concerning multilingual voice commands and internationalization.
This document specifies the linguistic requirements and recommendations for translation and localization of spoken words or phrases for voice commands.
This document also includes how to determine the correct words or phrases for voice commands based on the various…
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 3850...
1 Scope
This document provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of data within their organizations by
— applying the governance principles and model of ISO/IEC 38500 to the governance of data,
— assuring stakeholders that, if the…
Information technology — Security techniques — Governance of information security
1 Scope
This Recommendation | International Standard provides guidance on concepts and principles for the governance of information security, by which organisations can evaluate, direct, monitor and communicate the information security related activities within the organisation.
This International Standard is applicable to all types and sizes of organisations
Information technology — Security techniques — Competence requirements for information security mana...
1 Scope
This document specifies the requirements of competence for ISMS professionals leading or involved in establishing, implementing, maintaining and continually improving one or more information security management system processes that conforms to ISO/IEC 27001.
Information technology — Security techniques — Network security — Part 3: Reference networking scena...
1 Scope
This part of ISO/IEC 27033 describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security design techniques and controls required to mitigate the associated risks. Where relevant, it includes references to ISO/IEC 27033-4 to ISO/IEC 27033-6 to avoid…
Information technology — Security techniques — Network security — Part 4: Securing communications be...
1 Scope
This part of ISO/IEC 27033 gives guidance for securing communications between networks using
security gateways (firewall, application firewall, Intrusion Protection System, etc.) in accordance with
a documented information security policy of the security gateways, including:
a) identifying and analysing network security threats associated with security gateways;
b) defining network…