Information technology — Security techniques — Guidelines for identification, collection, acquisitio...
1
Scope
This International Standard provides guidelines for specific activities in handling digital evidence, which are identification, collection, acquisition and preservation of digital evidence that may be of evidential value. This International Standard provides guidance to individuals with respect to common situations encountered throughout the digital evidence handling process and assists…
Information technology — Security techniques — Specification for digital redaction
1 Scope
This International Standard specifies characteristics of techniques for performing digital redaction on
digital documents. This International Standard also specifies requirements for software redaction tools
and methods of testing that digital redaction has been securely completed.
This International Standard does not include the redaction of information from databases.
Information technology — Security techniques — Selection, deployment and operations of intrusion det...
1 Scope
This International Standard provides guidelines to assist organizations in preparing to deploy intrusion detection and prevention systems (IDPS). In particular, it addresses the selection, deployment, and operations of IDPS. It also provides background information from which these guidelines are derived.
Information technology — Security techniques — Storage security
1 Scope
This International Standard provides detailed technical guidance on how organizations can define
an appropriate level of risk mitigation by employing a well-proven and consistent approach to the
planning, design, documentation, and implementation of data storage security. Storage security applies
to the protection (security) of information where it is stored and to the security of the…
Information technology — Security techniques — Guidance on assuring suitability and adequacy of inci...
1 Scope
This International Standard provides guidance on mechanisms for ensuring that methods and processes
used in the investigation of information security incidents are “fit for purpose”. It encapsulates best
practice on defining requirements, describing methods, and providing evidence that implementations of
methods can be shown to satisfy requirements. It includes consideration of how…
Information technology — Security techniques — Guidelines for the analysis and interpretation of dig...
1 Scope
This International Standard provides guidance on the analysis and interpretation of digital evidence
in a manner which addresses issues of continuity, validity, reproducibility, and repeatability. It
encapsulates best practice for selection, design, and implementation of analytical processes and
recording sufficient information to allow such processes to be subjected to independent…
Information technology — Security techniques — Incident investigation principles and processes
1 Scope
This International Standard provides guidelines based on idealized models for common incident
investigation processes across various incident investigation scenarios involving digital evidence. This
includes processes from pre-incident preparation through investigation closure, as well as any general
advice and caveats on such processes. The guidelines describe processes and…
Information technology — Security techniques — Code of practice for personally identifiable informat...
1 Scope
This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into…
Information technology — Security techniques — Governance of information security
1 Scope
This Recommendation | International Standard provides guidance on concepts and principles for the governance of information security, by which organisations can evaluate, direct, monitor and communicate the information security related activities within the organisation.
This International Standard is applicable to all types and sizes of organisations
Petroleum and natural gas industries — Formulae and calculations for the properties of casing, tubin...
This document illustrates the formulae and templates necessary to calculate the various pipe properties given in International Standards, including
— pipe performance properties, such as axial strength, internal pressure resistance and collapse resistance,
— minimum physical properties,
— product assembly force (torque),
— product test pressures,
—…