Normen zur Technischen Sicherherheit
Beschreibung ISO/IEC TR 15446 provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC…
Beschreibung O/IEC TR 15443-1:2012 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding…
Beschreibung Application Security Weiterführende Links Hier weiter zur ISO Seite. Das Dokument wurde zurückgezogen, könnte jedoch hier noch erworben werden. Status Zurückgezogen
Beschreibung ISO/IEC 14888 specifies digital signatures with appendix.ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information technology — Security techniques — Digital signatures with appendix Status Aktuell: Stand…
Beschreibung ISO/TS 14441:2013 examines electronic patient record systems at the clinical point of care that are also interoperable with EHRs. ISO/TS 14441:2013 addresses their security and privacy protections by providing…
Beschreibung This document serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques.ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information security — Non-repudiation…
Beschreibung This Document provides guidelines on the development of an information security programme for institutions in the financial services industry. It includes discussion of the policies, organization and the structural,…
Beschreibung ISO 13491-1specifies the security characteristics for secure cryptographic devices (SCDs) based on the cryptographic processes defined in ISO 9564, ISO 16609, and ISO 11568.ISO Weiterführende Links Das Dokument kann…
Beschreibung This document defines key establishment mechanisms using symmetric cryptographic techniques.ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter IT Security techniques — Key management — Mechanisms using symmetric…
Beschreibung Specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined by CCITT Rec. X.213,…