Information technology — Security techniques — Guidelines for auditors on information security contr...
1 Scope
This Technical Report provides guidance on reviewing the implementation and operation of controls,
including technical compliance checking of information system controls, in compliance with an organization's
established information security standards.
This Technical Report is applicable to all types and sizes of organizations, including public and private
companies, government…
Information technology — Security techniques — Information security management systems — Overview an...
ISO/IEC 27000:2012 describes the overview and the vocabulary of information security management systems, which form the subject of the ISMS family of standards, and defines related terms and definitions.
ISO/IEC 27000:2012 is applicable to all types and sizes of organisation (e.g. commercial enterprises, government agencies, not-for-profit organisations).
Information technology - Security techniques - Information security management systems - Overview an...
ISO/IEC 27000:2012 describes the overview and the vocabulary of information security management systems, which form the subject of the ISMS family of standards, and defines related terms and definitions.
ISO/IEC 27000:2012 is applicable to all types and sizes of organisation (e.g. commercial enterprises, government agencies, not-for-profit organisations).
Information technology - Modeling Languages - Part 1: Syntax and Semantics for IDEF0
ISO/IEC/IEEE 31320-1:2012 identifies the basic components of Integration Definition 0 (IDEF0) syntax (the drawn, visual elements of the language and how they may be used together) and IDEF0 semantics (what it means when the visual elements are used together in specific, allowable ways), specifies the rules that govern the use of these modelling components, and describes the types of diagrams used…
Information technology - Modeling Languages - Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described.
The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Information technology — Modeling Languages — Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described.
The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Information technology — Modeling Languages — Part 1: Syntax and Semantics for IDEF0
ISO/IEC/IEEE 31320-1:2012 identifies the basic components of Integration Definition 0 (IDEF0) syntax (the drawn, visual elements of the language and how they may be used together) and IDEF0 semantics (what it means when the visual elements are used together in specific, allowable ways), specifies the rules that govern the use of these modelling components, and describes the types of diagrams used…
ISO/IEC 17998:2012 describes a framework that provides context and definitions to enable organizations to understand and deploy service-oriented architecture (SOA) governance.
ISO/IEC 17998:2012 defines:
SOA Governance, including its relationship between Business, IT, and EA governance; this assists organizations in understanding the impact that the introduction of SOA into an organization has…
ISO/IEC 17998:2012 describes a framework that provides context and definitions to enable organizations to understand and deploy service-oriented architecture (SOA) governance.
ISO/IEC 17998:2012 defines:
SOA Governance, including its relationship between Business, IT, and EA governance; this assists organizations in understanding the impact that the introduction of SOA into an organization has…
Information technology - Security techniques - Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life…