Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 11 - 20 de 450
Information security, cybersecurity and privacy protection — Information security controls based on ...
1 Scope The scope of this Recommendation | International Standard is to provide guidelines supporting the implementation of information security controls in telecommunications organizations. The adoption of this Recommendation | International Standard will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity,…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2025-02-28
Code(s) de l'ICS :
35.030
Cybersecurity — IoT security and privacy — Device baseline requirements
1 Scope This document provides baseline ICT requirements for IoT devices to support security and privacy controls.
Éditeur :
CSA
Statut :
Norme
Date de publication :
2025-02-28
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Privacy framework
1 Scope This document provides a privacy framework which: — specifies a common privacy terminology; — defines the actors and their roles in processing personally identifiable information (PII); — describes privacy safeguarding considerations; — provides references to known privacy principles for information technology. This document is applicable to natural persons and organizations…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2025-02-28
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hard...
1 Scope This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2025-02-28
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope This document specifies patch management (PAM) security assurance requirements and is intended to be used as an extension of the ISO/IEC 15408 series and ISO/IEC 18045. The security assurance requirements specified in this document do not include evaluation or test activities on the final target of evaluation (TOE), but focus on the initial TOE and on the life cycle processes used by…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2025-02-28
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Security requirements for cryptographic...
This document specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive information in Information and Communication Technologies (ICT). It defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity and a diversity of application environments. This document specifies up to four security…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2025-02-25
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Test requirements for cryptographic mod...
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories. This document also specifies the information that vendors are required to…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2025-02-25
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection - Security requirements for cryptographic...
This document specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive information in Information and Communication Technologies (ICT). It defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity and a diversity of application environments. This document specifies up to four security…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2025-02-25
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection - Test requirements for cryptographic mod...
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories. This document also specifies the information that vendors are required to…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2025-02-25
Code(s) de l'ICS :
35.030
Information technology — Business operational view — Part 1: Operational aspects of open-edi for imp...
This document addresses the fundamental requirements of the commercial and legal frameworks and their environments on business transactions. It also integrates the requirements of the information technology and telecommunications environments. In addition to the existing strategic directions of "portability" and "interoperability", the added strategic direction of ISO/IEC JTC …
Éditeur :
ISO
Statut :
Publié
Date de publication :
2025-02-11
Code(s) de l'ICS :
35.240.63

Spacer