Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 81 - 90 de 392
Information security, cybersecurity and privacy protection — Security techniques — Security properti...
This document introduces security properties and provides best practices on the test and evaluation of white box cryptography (WBC). WBC is a cryptographic algorithm specialized for a key or secret, but where the said key cannot be extracted. The WBC implementation can consist of plain source code for the cryptographic algorithm and/or of a device implementing the algorithm. In both cases,…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-10-19
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection - Security techniques - Security properti...
This document introduces security properties and provides best practices on the test and evaluation of white box cryptography (WBC). WBC is a cryptographic algorithm specialized for a key or secret, but where the said key cannot be extracted. The WBC implementation can consist of plain source code for the cryptographic algorithm and/or of a device implementing the algorithm. In both cases,…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2022-10-19
Code(s) de l'ICS :
35.030
Information technology — Biometric data interchange formats — Part 14: DNA data
This document specifies a data interchange format for the exchange of deoxyribonucleic acid (DNA) data for person identification or verification technologies that utilize human DNA. Consideration of laboratory procedures is out of scope of this document. This document provides the ability for DNA profile data to be exchanged and used for comparison (subject to privacy regulations) with DNA…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-10-13
Code(s) de l'ICS :
35.240.15
Information technology - Biometric data interchange formats - Part 14: DNA data
This document specifies a data interchange format for the exchange of deoxyribonucleic acid (DNA) data for person identification or verification technologies that utilize human DNA. Consideration of laboratory procedures is out of scope of this document. This document provides the ability for DNA profile data to be exchanged and used for comparison (subject to privacy regulations) with DNA…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2022-10-13
Code(s) de l'ICS :
35.240.15
Information security, cybersecurity and privacy protection — User-centric privacy preferences manage...
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-10-09
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection - User-centric privacy preferences manage...
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.
Éditeur :
IEC
Statut :
Publié
Date de publication :
2022-10-09
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Guidance on the integrated implementati...
1 Scope This document gives guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 for organizations intending to: a) implement ISO/IEC 27001 when ISO/IEC 20000-1 is already implemented, or vice versa; b) implement both ISO/IEC 27001 and ISO/IEC 20000-1 together; or c) integrate existing management systems based on ISO/IEC 27001 and ISO/IEC 20000-1. This document…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
03.080.99; 03.080.99
Privacy – Part 1: Qualification and Proficiency of Access-to-Information, Privacy, and Data Protecti...
This Standard specifies minimum requirements for qualification and proficiency of privacy and access control professionals. This Standard defines a framework for individuals seeking to demonstrate their competencies and qualifications as access-to-information, privacy, and data protection professionals, as well as organizations seeking to offer training and certification programs. This…
Éditeur :
CSDPI
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
03.100.30
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders. EXAMPLE        Examples of provided packages include the evaluation assurance levels (EAL) and the composed assurance packages (CAPs). This document presents: —    evaluation assurance level (EAL) family of packages that specify…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-08-08
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides a standardized framework for specifying objective, repeatable and reproducible evaluation methods and evaluation activities. This document does not specify how to evaluate, adopt, or maintain evaluation methods and evaluation activities. These aspects are a matter for those originating the evaluation methods and evaluation activities in their particular area of interest.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-08-08
Code(s) de l'ICS :
35.030