Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 1761 - 1770 of 2990
Information technology — Security techniques — Network security — Part 1: Overview and concepts
ISO/IEC 27033-1:2009 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services and end-users, in addition to security of the information being…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2009-12-09
ICS Code(s) :
35.030
Information technology - Security techniques - Network security - Part 1: Overview and concepts
ISO/IEC 27033-1:2009 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services and end-users, in addition to security of the information being…
Publisher :
IEC
Status :
Revised
Published Date :
2009-12-09
ICS Code(s) :
35.030
Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric...
ISO/IEC 13888-3:2009 specifies mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
Publisher :
ISO
Status :
Withdrawn
Published Date :
2009-12-06
ICS Code(s) :
35.030
Automation systems and integration — Numerical control of machines — Program format and definitions ...
ISO 6983-1:2009 specifies requirements and makes recommendations for a data format for positioning, line motion and contouring control systems used in the numerical control of machines. ISO 6983-1:2009 helps the co-ordination of system design in order to minimize the variety of program manuscripts required, to promote uniformity of programming techniques, and to foster interchangeability of input…
Publisher :
ISO
Status :
Published
Published Date :
2009-12-06
ICS Code(s) :
25.040.20
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric...
ISO/IEC 13888-3:2009 specifies mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
Publisher :
IEC
Status :
Revised
Published Date :
2009-12-06
ICS Code(s) :
35.030
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introdu...
ISO/IEC 15408-1:2009 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408 which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. It provides an overview of all parts of ISO/IEC 15408. It describes the various parts of ISO/IEC 15408;…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2009-12-02
ICS Code(s) :
35.030
Technologies de l'information — Techniques de sécurité — Critères d'évaluation pour la séc...
La présente partie de l'ISO/IEC 15408 établit les concepts et principes généraux de l'évaluation de la sécurité des technologies de l'information (TI). Elle spécifie le modèle général d'évaluation donné par les différentes parties de la norme qui, dans son intégralité, est destinée à servir de base à l'évaluation des propriétés de sécurité des produits TI. La Partie 1…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2009-12-02
ICS Code(s) :
35.030
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introdu...
ISO/IEC 15408-1:2009 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408 which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. It provides an overview of all parts of ISO/IEC 15408. It describes the various parts of ISO/IEC 15408;…
Publisher :
IEC
Status :
Revised
Published Date :
2009-12-02
ICS Code(s) :
35.030
Technologies de l'information - Techniques de sécurité - Critères d'évaluation pour la séc...
La présente partie de l'ISO/IEC 15408 établit les concepts et principes généraux de l'évaluation de la sécurité des technologies de l'information (TI). Elle spécifie le modèle général d'évaluation donné par les différentes parties de la norme qui, dans son intégralité, est destinée à servir de base à l'évaluation des propriétés de sécurité des produits TI. La Partie 1…
Publisher :
IEC
Status :
Revised
Published Date :
2009-12-02
ICS Code(s) :
35.030
Risk management — Risk assessment techniques
IEC 31010:2009 is a dual logo IEC/ISO, single prefix IEC, supporting standard for ISO 31000 and provides guidance on selection and application of systematic techniques for risk assessment. This standard is not intended for certification, regulatory or contractual use. NOTE: This standard does not deal specifically with safety. It is a generic risk management standard and any references to safety…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2009-11-30
ICS Code(s) :
03.100.01