Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 111 - 120 of 410
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides a standardized framework for specifying objective, repeatable and reproducible evaluation methods and evaluation activities. This document does not specify how to evaluate, adopt, or maintain evaluation methods and evaluation activities. These aspects are a matter for those originating the evaluation methods and evaluation activities in their particular area of interest.
Publisher :
ISO
Status :
Published
Published Date :
2022-08-08
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products.
Publisher :
ISO
Status :
Published
Published Date :
2022-08-08
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — M...
This document defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series.
Publisher :
ISO
Status :
Published
Published Date :
2022-08-08
ICS Code(s) :
35.030
UAS traffic management (UTM) — Part 12: Requirements for UTM service providers
This document includes compliance monitoring, safety, security, privacy and other organisational requirements for providers in the context of UAS traffic management services.
Publisher :
ISO
Status :
Published
Published Date :
2022-07-28
ICS Code(s) :
03.080.99; 49.020
Cybersecurity — IoT security and privacy — Guidelines
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT) solutions.
Publisher :
ISO
Status :
Published
Published Date :
2022-06-06
ICS Code(s) :
35.030
Cybersecurity - IoT security and privacy - Guidelines
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT) solutions.
Publisher :
IEC
Status :
Published
Published Date :
2022-06-06
ICS Code(s) :
35.030
Intelligent transport systems — Extracting trip data using nomadic and mobile devices for estimating...
This document specifies a method for the determination of fuel consumption and resulting CO2 emissions to enable fleet managers to reduce fuel costs and greenhouse gas (GHG) emissions in a sustainable manner. The fuel consumption determination is achieved by extracting trip data and speed profiles from the global navigation satellite system (GNSS) receiver of a nomadic device (ND), by sending it…
Publisher :
ISO
Status :
Published
Published Date :
2022-05-30
ICS Code(s) :
13.020.40; 13.020.40
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
This document specifies the test and evaluation methods for physically unclonable functions (PUFs). The test and evaluation methods consist of inspection of the design rationale of the PUF and comparison between statistical analyses of the responses from a batch of PUFs or a unique PUF versus specified thresholds. This document is related to ISO/IEC 19790 which specifies security requirements for…
Publisher :
ISO
Status :
Published
Published Date :
2022-05-24
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection - Physically unclonable functions - Part ...
This document specifies the test and evaluation methods for physically unclonable functions (PUFs). The test and evaluation methods consist of inspection of the design rationale of the PUF and comparison between statistical analyses of the responses from a batch of PUFs or a unique PUF versus specified thresholds. This document is related to ISO/IEC 19790 which specifies security requirements for…
Publisher :
IEC
Status :
Published
Published Date :
2022-05-24
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 154...
This document: —    introduces the break down between the former ISO/IEC 15408 series (ISO/IEC 15408-1:2009, ISO/IEC 15408-2:2008) and ISO/IEC 15408-3:2008) and ISO/IEC 18045:2008 and the new parts introduced in the ISO/IEC 15408:2022 series and ISO/IEC 18045:2022; —    presents the concepts newly introduced as well as the rationale for their inclusion; —    proposes an evolution path and…
Publisher :
ISO
Status :
Published
Published Date :
2022-05-16
ICS Code(s) :
35.030