Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 4: Data qualit...
1 Scope
This document establishes general common organizational approaches, regardless of the type, size or nature of the applying organization, to ensure data quality for training and evaluation in analytics and machine learning (ML). It includes guidance on the data quality process for:
— supervised ML with regard to the labelling of data used for training ML systems, including common…
Information technology — Security techniques — Testing methods for the mitigation of non-invasive at...
1 Scope
This document specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790:2012 for security levels 3 and 4. The test metrics are associated with the security functions addressed in ISO/IEC 19790:2012. Testing is conducted at the defined boundary of the cryptographic module and the inputs/outputs available at its…
Test methods for machine readable travel documents (MRTD) and associated devices — Part 1: Physical ...
1 Scope
This document provides a set of instructions for evaluation of MRPs which may incorporate contactless integrated circuits. This evaluation is an instrument to establish the ability in principle of a specific type of document to fulfil the requirements of use. It supplies a structured approach to evaluate MRPs by:
— defining reproducible stress methods to submit the document(s) under…
Internet of things (IoT) and digital twin — Vocabulary
1 Scope
This document provides a definition of Internet of Things and digital twin along with a set of
terms and definitions. This document is a terminology foundation for the Internet of Things and
digital twin.
Information security — Security requirements, test and evaluation methods for quantum key distributi...
1 Scope
This document specifies a general framework for the security evaluation of quantum key distribution (QKD) according to the ISO/IEC 15408 series. Specifically, it specifies a baseline set of common security functional requirements (SFRs) for QKD modules, including SFRs on the conventional network components and the quantum optical components, and the entire implementation of QKD protocols…
Information security — Security requirements, test and evaluation methods for quantum key distributi...
1 Scope
This document specifies test and evaluation methods for the security evaluation of quantum key distribution (QKD). It also describes evaluation activities that constitute the test and evaluation methods for the security functional requirements on the implementation of QKD protocols, the quantum optical components and conventional network components in QKD modules. Moreover, supplementary…
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit...
1 Scope
This document specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1.
The requirements contained in this document are demonstrated in terms of competence and reliability by bodies providing ISMS certification. The guidance contained in…
Information security, cybersecurity and privacy protection — Information security controls based on ...
1 Scope
The scope of this Recommendation | International Standard is to provide guidelines supporting the implementation of information security controls in telecommunications organizations.
The adoption of this Recommendation | International Standard will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity,…
Cybersecurity — Guidelines for Internet security
1 Scope
This document provides:
— an explanation of the relationship between Internet security, web security, network security and cybersecurity;
— an overview of Internet security;
— identification of interested parties and a description of their roles in Internet security;
— high-level guidance for addressing common Internet security issues.
This document is intended for organizations…