Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3637 - 3648 of 6378
Notice of Intent

Information security, cybersecurity and privacy...

This document provides guidance to assist organizations to: — fulfil the requirements of ISO/IEC 27001 concerning actions to address information security risks; — perform information security risk management activities...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for: — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology - Information security...

This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing...
Notice of Intent

Information technology - Information security...

This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing...
Flexible Standard

National Technical Specification

A TS is a standards document developed to address the needs of a fast-paced and changing market or regulatory environment when an existing National Standard of Canada or international standard is not available. A TS can be...
Committee

MC/IEC/TC 8/SC 8B

"To develop IEC publications enabling the development of secure, reliable and cost-effective systems with decentralized management for electrical energy supply, which are alternative, complement or precursor to traditional...
Notice of Intent

Amendment 1 - Information technology - Security...

ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper...
Notice of Intent

Amendment 2 - Information technology - Security...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent

Systems and software engineering - Life cycle...

This document provides a common framework for planning and controlling the technical processes and activities to produce and sustain software products. The complete life cycle is covered by this document, from idea conception...
Notice of Intent

Information security - Authenticated encryption

This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of...
Notice of Intent

Information technology - Information security...

This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and...