ISO

Available (778)

Showing 577 - 588 per page



ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method

This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27041:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction

Some documents can contain information that must not be disclosed to some communities. Modified documents can be released to these communities after an appropriate processing of the original document. This process is called the “redaction” of the document.
This International Standard specifies characteristics of techniques for performing digital redaction on digital documents. This International Standard also specifies requirements for software redaction tools and methods of testing that digital redaction has been securely completed.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27038:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls

This International Standard gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization’s information security risk environment(s).

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27002:ed-2:v1:en

ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements

 

This International Standard specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This International Standard also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en

ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General

The goal of a non-repudiation service is to generate, collect, maintain, make available and verify evi­dence concerning a claimed event or action in order to re­solve dis­putes about the occurrence or non occurrence of the event or action. 
Non-repudiation services establish evidence; evidence es­tablishes accountability regarding a particular event or action. The entity responsible for the action, or associated with the event, with regard to which evi­dence is generated, is known as the evidence subject.
This part of ISO/IEC 13888 serves as a general model for subsequent parts specifying non-repudia­tion mechanisms using cryptographic techniques. ISO/IEC 13888 provides non-repudiation mechanisms for the following phases of non-repudiation:

— evidence generation;

— evidence transfer, storage and retrieval; and

— evidence verification.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:13888:-1:ed-3:v1:en

ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques:

— mechanisms based on identities and providing unilateral authentication;

— mechanisms based on integer factorization and providing unilateral authentication;

— mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;

— mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;

— mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.

These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:9798:-5:ed-3:v1:en

ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function

This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function. Two mechanisms are concerned with the authentication of a single entity (unilateral authentication), while the remaining are mechanisms for mutual authentication of two entities.

The mechanisms specified in this part of ISO/IEC 9798 use time variant parameters such as time stamps, sequence numbers, or random numbers, to prevent valid authentication information from being accepted at a later time or more than once.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:9798:-4:ed-2:v1:en
 

ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques

This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two categories, two mechanisms achieve unilateral authentication and the remaining three achieve mutual authentication.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:9798:-3:ed-3:v1:en
 

ISO/IEC JTC 1/WG11 DIS 30146 - Smart city ICT indicators

This document defines a comprehensive set of evaluation indicators specially related to information and communication technologies (ICT) adoption and usage in smart cities. Firstly, this document establishes an overall framework for all the indicators. Then, this document specifies the name, description, classification and measure method for each indicator.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:30146:dis:ed-2:v1:en

Relationship with ISO 12100 — Part 4: Guidance to machinery manufacturers for consideration of related IT-security (cyber security) aspects.

This document gives machine manufacturers guidance on potential security aspects in relation to safety of machinery when putting a machine into service or placing on the market for the first time. It provides essential information to identify and address IT-security threats which can influence safety of machinery.

Source: https://www.iso.org/standard/73335.html

ISO/TR 22100-4:2018