IT Security

Available (316)

Showing 253 - 264 per page



Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms

This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery. The security of these schemes is based on the difficulty of the discrete logarithm problem, which is defined on a finite field or an elliptic curve over a finite field.

ISO/IEC 9796-3:2006

ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction

Some documents can contain information that must not be disclosed to some communities. Modified documents can be released to these communities after an appropriate processing of the original document. This process is called the “redaction” of the document.
This International Standard specifies characteristics of techniques for performing digital redaction on digital documents. This International Standard also specifies requirements for software redaction tools and methods of testing that digital redaction has been securely completed.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27038:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method

This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27041:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence

This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to aid understanding of an incident. The exact nature of the data and information making up the potential digital evidence will depend on the nature of the incident and the digital evidence sources involved in that incident.

This International Standard provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27042:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes

This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27043:ed-1:v1:en

IEEE 1619.1-2007 - C/CPSC - IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies cryptographic and data authentication procedures for storage devices that support length-expansion, such as tape drives. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.

IEEE 1667-2006 - C/CPSC - IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices

Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified.
Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.

IEEE 1686-2007 - PE/PSCC - IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities

In this standards are defined the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs.
This standards also addresses the security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED.

IEEE 1686-2013 - PE/PSCC - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities

In this standards are defined the functions and features to be provided in intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs.
This standards also addresses the security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED.