Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 81 - 90 de 433
Document management — Information classification, marking and handling — Part 1: Requirements
This document specifies requirements for information classification, marking and handling (ICMH). This document also defines how such information can be accessed by users, both inside and outside the organization, who own the information. This document is applicable to, but not limited to, the following: a)    organizations of any size that create, store, share or otherwise process information; b…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-05-09
Code(s) de l'ICS :
37.080
Information technology — Security techniques — Guidelines for privacy impact assessment
This document gives guidelines for: —    a process on privacy impact assessments, and —    a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the parties…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-05-07
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Guidelines for privacy impact assessment
This document gives guidelines for: — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the parties…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2023-05-07
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Verification of cryptographic protocols...
This document establishes a framework for the verification of cryptographic protocol specifications according to academic and industry best practices.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-03-19
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection - Verification of cryptographic protocols...
This document establishes a framework for the verification of cryptographic protocol specifications according to academic and industry best practices.
Éditeur :
IEC
Statut :
Publié
Date de publication :
2023-03-19
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2023-02-28
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products.
Éditeur :
CSA
Statut :
Norme
Date de publication :
2023-02-28
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).
Éditeur :
CSA
Statut :
Norme
Date de publication :
2023-02-28
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
Scope This document provides a standardized framework for specifying objective, repeatable and reproducible evaluation methods and evaluation activities.This document does not specify how to evaluate, adopt, or maintain evaluation methods and evaluation activities. These aspects are a matter for those originating the evaluation methods and evaluation activities in their particular area of…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2023-02-28
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders. EXAMPLE Examples of provided packages include the evaluation assurance levels (EAL) and the composed assurance packages (CAPs). This document presents: — evaluation assurance level (EAL) family of packages that…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2023-02-28
Code(s) de l'ICS :
35.030