Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 401 - 410 de 433
Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment ...
Éditeur :
ISO
Statut :
Annulée
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection – Guidelines for protection of personally...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment. In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the…
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides a standardized framework for specifying objective, repeatable and reproducible evaluation methods and evaluation activities. This document does not specify how to evaluate, adopt, or maintain evaluation methods and evaluation activities. These aspects are a matter for those originating the evaluation methods and evaluation activities in their particular area of interest.
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products.
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders. EXAMPLE        Examples of provided packages include the evaluation assurance levels (EAL) and the composed assurance packages (CAPs). This document presents: —    evaluation assurance level (EAL) family of packages that specify…
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the…
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
ISO/IEC 19896-1:2018 defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evaluation specialists, thereby establishing a basis for shared understanding of the concepts and principles central to the ISO/IEC 19896 series across its user communities. It provides fundamental…
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030
Information technology — Identification of privacy protection requirements pertaining to learning, e...
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
03.100.30; 35.240.90
Information security, cybersecurity and privacy protection — Security and privacy requirements for a...
This document provides high level security and privacy requirements for authentication using biometrics on mobile devices, including security and privacy requirements for functional components, for communication, for storage and for remote processing. This document is applicable to remote modes, i.e., the cases that: - the biometric sample is captured through mobile devices; - the biometric…
Éditeur :
ISO
Statut :
Brouillon
Date de publication :
1969-12-30
Code(s) de l'ICS :
35.030