Information security — Security requirements, test and evaluation methods for quantum key distributi...
1 Scope
This document specifies test and evaluation methods for the security evaluation of quantum key distribution (QKD). It also describes evaluation activities that constitute the test and evaluation methods for the security functional requirements on the implementation of QKD protocols, the quantum optical components and conventional network components in QKD modules. Moreover, supplementary…
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit...
1 Scope
This document specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1.
The requirements contained in this document are demonstrated in terms of competence and reliability by bodies providing ISMS certification. The guidance contained in…
Information security, cybersecurity and privacy protection — Information security controls based on ...
1 Scope
The scope of this Recommendation | International Standard is to provide guidelines supporting the implementation of information security controls in telecommunications organizations.
The adoption of this Recommendation | International Standard will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity,…
Information technology — Security techniques — Privacy framework
1 Scope
This document provides a privacy framework which:
— specifies a common privacy terminology;
— defines the actors and their roles in processing personally identifiable information (PII);
— describes privacy safeguarding considerations;
— provides references to known privacy principles for information technology.
This document is applicable to natural persons and organizations…
Information technology — Artificial intelligence — Management system
1 Scope
This document specifies the requirements and provides guidance for establishing, implementing, maintaining and continually improving an AI (artificial intelligence) management system within the context of an organization.
This document is intended for use by an organization providing or using products or services that utilize AI systems. This document is intended to help the…
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hard...
1 Scope
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope
This document specifies patch management (PAM) security assurance requirements and is intended to be used as an extension of the ISO/IEC 15408 series and ISO/IEC 18045.
The security assurance requirements specified in this document do not include evaluation or test activities on the final target of evaluation (TOE), but focus on the initial TOE and on the life cycle processes used by…
Telecommunications and information exchange between systems — Specific requirements for local and me...
1.1 Scope
The scope of this standard is to define one medium access control (MAC) and several physical layer (PHY)
specifications for wireless connectivity for fixed, portable, and moving stations (STAs) within a local area.
Spas, hot tubs, cold tubs, and associated equipment
1 Scope
1.1
This Standard applies to spas, hot tubs, cold tubs, and associated equipment intended for residential and commercial use indoors or outdoors in nonhazardous locations, installed in accordance with the Rules of the Canadian Electrical Code, Part I, and connected
a)
permanently to an electrical circuit of 250 V or less (i.e., a maximum of 150 volts-to-ground); or
b)
by a factory-…
Sécurité de l’information, cybersécurité et protection de la vie privée — Exigences pour les organis...
1 Domaine d'application
Le présent document spécifie les exigences et fournit des recommandations pour les organismes procédant à l'audit et à la certification d'un système de management de la sécurité de l'information (SMSI), en plus des exigences contenues dans l'ISO/IEC 17021-1.
Les organismes qui procèdent à la certification de systèmes ISMS démontrent qu'ils…