Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 151 - 160 de 392
Information security, cybersecurity and privacy protection — Governance of information security
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization. The intended audience for this document is: — governing body and top management; — those who are responsible for evaluating, directing and…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-12-14
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection - Governance of information security
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization. The intended audience for this document is: — governing body and top management; — those who are responsible for evaluating, directing and…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-12-14
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF. Amongst PUF use cases,…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-12-08
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection - Physically unclonable functions - Part ...
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF. Amongst PUF use cases,…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-12-08
Code(s) de l'ICS :
35.030
Active assisted living (AAL) reference architecture and architecture model - Part 1: Reference archi...
IEC 63240-1:2020 specifies the AAL reference architecture. This document defines concepts and introduces terminology. It provides generic rules for designers of AAL systems and services with the aim to facilitate systems design and enable interoperability between components. This document identifies safety, security, privacy, and other requirements for AAL systems such as usability,…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-11-17
Code(s) de l'ICS :
11.180; 11.020.99
Active assisted living (AAL) reference architecture and architecture model - Part 2: Architecture mo...
IEC 63240-2:2020 specifies the AAL architecture model. This document defines concepts and introduces terminology. IEC 63240-1 provides generic rules for designers of AAL systems and services with the aim to facilitate systems design and enable interoperability between components. This document provides a framework to analyse use cases on a common view and terminology, which is a foundation for…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-11-17
Code(s) de l'ICS :
11.180; 11.020.99
Information security, cybersecurity and privacy protection — Guidelines for information security man...
1 Scope This document provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011. This document is applicable to those needing to understand or conduct internal or external audits of an ISMS or to manage an ISMS audit programme
Éditeur :
CSA
Statut :
Norme
Date de publication :
2020-10-31
Code(s) de l'ICS :
03.120.20; 35.030
Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC ...
1 Scope This document specifies the requirements for creating sector-specific standards that extend ISO/IEC 27001, and complement or amend ISO/IEC 27002 to support a specific sector (domain, application area or market). This document explains how to: — include requirements in addition to those in ISO/IEC 27001, — refine or interpret any of the ISO/IEC 27001 requirements, — include controls…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2020-10-31
Code(s) de l'ICS :
35.030
Information technology — Cloud computing — Edge computing landscape
1 Scope This document examines the concept of edge computing, its relationship to cloud computing and IoT, and the technologies that are key to the implementation of edge computing. This document explores the following topics with respect to edge computing: — concept of edge computing systems; — architectural foundation of edge computing; — edge computing terminology; — software…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2020-10-31
Code(s) de l'ICS :
35.210
Information technology for learning, education and training — Reference framework of e-Portfolio inf...
This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and personal development. The reference framework identifies content and functional components that…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-10-14
Code(s) de l'ICS :
03.100.30; 35.240.90