Information technology — Security techniques — Guidelines for information and communication technolo...
1 Scope
This International Standard describes the concepts and principles of information and communication
technology (ICT) readiness for business continuity, and provides a framework of methods and processes to
identify and specify all aspects (such as performance criteria, design, and implementation) for improving an
organization's ICT readiness to ensure business continuity. It applies…
Information technology — International string ordering and comparison — Method for comparing charact...
1 Scope
This International Standard defines the following.
- A reference comparison method. This method is applicable to two character strings to determine their
collating order in a sorted list. The method can be applied to strings containing characters from the full
repertoire of ISO/IEC 10646. This method is also applicable to subsets of that repertoire, such as those of
the different ISO/…
Technologies de l’information — Classement international et comparaison de chaînes de caractères — M...
1 Domaine d'application
La présente Norme internationale définit ce qui suit.
- Une méthode de référence pour la comparaison de deux chaînes de caractères ayant pour but de
déterminer leur ordre de classement dans une liste triée. La méthode s'applique à des chaînes utilisant le
répertoire complet de l’ISO/CEI 10646, des sous-répertoires tels que ceux des divers jeux normalisés
ISO/…
Information technology — Automatic identification and data capture techniques — Bar code symbol prin...
1 Scope
This International Standard
- specifies two methodologies for the measurement of specific attributes of two-dimensional bar code
symbols, one of these being applicable to multi-row bar code symbologies and the other to twodimensional
matrix symbologies;
- defines methods for evaluating and grading these measurements and deriving an overall assessment of
symbol quality;
- gives information…
1 Scope
This part of ISO/IEC 14443 describes:
- polling for proximity cards or objects (PICCs) entering the field of a proximity coupling device (PCD);
- the byte format, the frames and timing used during the initial phase of communication between PCDs and
PICCs;
- the initial Request and Answer to Request command content;
- methods to detect and communicate with one PICC among several PICCs (…
Information technology — Open Distributed Processing —
Reference model: Overview
1 Scope and field of application
This Recommendation | International Standard:
– gives an introduction and motivation for ODP;
– provides an overview of the Reference Model of Open Distributed Processing (RM-ODP) and an
explanation of its key concepts;
– gives guidance on the application of the RM-ODP.
This Recommendation | International Standard covers both overview and detailed explanation, and…
Information technology — Security techniques — Information security incident management
1 Scope
This International Standard provides a structured and planned approach to:
a) detect, report and assess information security incidents;
b) respond to and manage information security incidents;
c) detect, assess and manage information security vulnerabilities; and
d) continuously improve information security and incident management as a result of managing information
security…
Information technology — Security techniques — Requirements for bodies providing audit and certifica...
1 Scope
This International Standard specifies requirements and provides guidance for bodies providing audit and
certification of an information security management system (ISMS), in addition to the requirements contained
within ISO/IEC 17021 and ISO/IEC 27001. It is primarily intended to support the accreditation of certification
bodies providing ISMS certification.
The requirements contained…
Information technology — Security techniques — Guidelines for information security management system...
1 Scope
This International Standard provides guidance on managing an information security management system
(ISMS) audit programme, on conducting the audits, and on the competence of ISMS auditors, in addition to
the guidance contained in ISO 19011.
This International Standard is applicable to those needing to understand or conduct internal or external audits of an
ISMS or to manage an ISMS…
Information technology — Abstract Syntax Notation One (ASN.1): Constraint specification
1 Scope
This Recommendation | International Standard is part of Abstract Syntax Notation One (ASN.1) and provides notation for specifying user-defined constraints, table constraints, and contents constraints.