Hier finden Sie alle Normen und Standards, der Reihe nach aufgelistet.

  • ISO 15764 – Extended data link security

    Beschreibung ISO 15764:2004 describes an extension of data link protocols for enhancing the security of data transfers between electronic control units (ECUs) connected by a communication network used in road vehicles. It is based on cryptographic methods that include encryption, digital signatures and message authentication codes (MACs). It provides a description of services to establish…


  • ISO 15816 – Security information objects for access control

    Beschreibung The scope of this Recommendation | International Standard is the definition of guidelines for specifying the abstract syntax of generic and specific Security Information Objects (SIOs) for Access Control; the specification of generic SIOs for Access Control; the specification of specific SIOs for Access Control. ISO Weiterführende Links Das Dokument kann hier erworben werden.…


  • ISO 15945 – Specification of TTP services to support the application of digital signatures

    Beschreibung This Recommendation | International Standard will define those TTP services needed to support the application of digitalsignatures for the purpose of non-repudiation of creation of documents. ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information technology — Security techniques — Specification of TTP services to support the application of digital signatures Status…


  • ISO 15946-1 – Cryptographic techniques based on elliptic curves

    Beschreibung ISO/IEC 15946-1:2016 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946‑5, ISO/IEC 9796‑3, ISO/IEC 11770‑3, ISO/IEC 14888‑3, ISO/IEC 18033‑2 and other ISO/IEC standards. ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information technology — Security techniques — Cryptographic techniques based on elliptic…


  • ISO 17574 – Guidelines for security protection profiles

    Beschreibung ISO/TS 17574:2017 provides guidelines for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in ISO/IEC 15408 (all parts) and in ISO/IEC TR 15446. ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Electronic fee collection — Guidelines for security protection profiles Status Aktuell: Stand 2020


  • ISO 17839-1 – Biometric System-on-Card

    Beschreibung ISO/IEC 17839-1:2014 provides a functional architectural description of a Biometric System-on-Card and describes how the interfaces are mapped using existing commands and data structures from other International Standards. ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information technology — Biometric System-on-Card — Core requirements Status Aktuell: Stand 2020


  • ISO 18014-1 – Time-stamping services

    Beschreibung ISO/IEC 18014 specifies time-stamping techniques. It consists of three parts, which include the general notion, models for a time-stamping service, data structures, and protocols. ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information technology — Security techniques — Time-stamping services Status Aktuell: Stand 2020


  • ISO 18028-1 – Network security management

    Beschreibung ISO/IEC 18028-1:2006 provides detailed guidance on the security aspects of the management, operation and use of information technology (IT) networks, and their interconnections. ISO Weiterführende Links Hier können Sie mehr über die Norm erfahren. Das Dokument wurde bereits zurückgezogen, ist jedoch hier noch erwerbbar. Schlagwörter Information technology — Security techniques — IT network security —…


  • ISO 18028-4 – Securing remote access

    Beschreibung ISO/IEC 18028-4:2005 provides guidance for securely using remote access – a method to remotely connect a computer either to another computer or to a network using public networks – and its implication for IT security. In this it introduces the different types of remote access including the protocols in use, discusses the authentication issues…


  • ISO 18031 – Random bit generation

    Beschreibung ISO/IEC 18031:2011 specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model. ISO Weiterführende Links Das Dokument kann hier erworben werden. Schlagwörter Information technology — Security techniques — Random bit generation Status Wird überarbeitet: Stand 2020