Information technology — Security techniques — Network security — Part 1: Overview and concepts
This part of ISO/IEC 27033 provides an overview of network security and related definitions. It defines
and describes the concepts associated with, and provides management guidance on, network security.
(Network security applies to the security of devices, security of management activities related to the
devices, applications/services, and end-users, in addition to security of the information…
1.1 Purpose
This Standard establishes minimum requirements for electrical work and electrical equipment
operating, or intended to operate, at a mine.
Note: Users should be aware that federal, provincial, and territorial legislation can impose additional
requirements.
1.2 Application
This Standard is supplementary to, or amendatory of, the requirements of the Canadian Electrical Code,
Part…
1.1 General
This Standard applies to packages for consumer products available in liquid or solid form that incorporate reclosable child-resistant features that restrict children’s ability to gain access to the contents of the packages. Such packages include (but are not limited to) packages with a continuous- thread, lug-finish, or snap closure.
1.2 Requirements
This Standard includes…
Site preparation, foundation, and installation of buildings
1.1 Application
This Standard applies to single- and multi-section buildings supported on longitudinal floor beams, or
perimeter rim joists designed to perform as beams.
1.2 Issues addressed
This Standard specifies requirements for the following aspects of building installation:
a) site preparation;
b) permanent foundations;
c) anchorage to resist overturning and pier toppling due to wind…
Information technology — Biometric System-on-Card — Part 2: Physical characteristics
This part of ISO/IEC 17839 defines the following:
— dimensions of a Biometric System-on-Card type S1 and type S2;
— position and size of the biometric capture device;
— minimum requirements to a Biometric System-on-Card with respect to
— mechanical durability, and
— man-machine interface and ergonomics.
The standardization of other on-card devices such as an electronic display or a keypad…
Information technology — Telecommunications and information exchange between systems — Local and met...
Link Aggregation provides protocols, procedures, and managed objects that allow the following:
— One or more parallel instances of full-duplex point-to-point links to be aggregated together to form a
Link Aggregation Group (LAG), such that a MAC Client can treat the LAG as if it were a single link.
— A resilient interconnect using multiple full-duplex point-to-point links among one to three…
Information technology — Telecommunications and information exchange between systems — Local and met...
This standard contains descriptions of the IEEE 802® standards published by the IEEE for frame-based data
networks as well as a reference model (RM) for protocol standards. The IEEE 802 architecture is defined,
and a specification for the identification of public, private, and standard protocols is included.
Information technology — ASN.1 encoding rules: Specification of Encoding Control Notation (ECN)
This Recommendation | International Standard defines a notation for specifying encodings of ASN.1 types or of parts of types.
It provides several mechanisms for such specification, including:
– direct specification of the encoding using standardized notation;
– specification of the encoding by reference to standardized encoding rules;
– specification of the encoding of an ASN.1 type by…
Information technology — ASN.1 encoding rules: XML Encoding Rules (XER)
This Recommendation | International Standard specifies a set of basic XML Encoding Rules (BASIC-XER) that may be
used to derive a transfer syntax for values of types defined in Rec. ITU-T X.680 | ISO/IEC 8824-1 and Rec. ITU-T X.681
| ISO/IEC 8824-2. This Recommendation | International Standard also specifies a set of Canonical XML Encoding Rules
(CXER) which provide constraints on the basic…
Information technology — Trusted Platform Module Library — Part 1: Architecture
This part of ISO/IEC 11889 defines the architectural elements of the Trusted Platform Module (TPM), a
device which enables trust in computing platforms in general. Some TPM concepts are explained
adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a
TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in…