Standard

Available (2726)

Showing 2161 - 2172 per page



ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-4:ed-2:v1:en

ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management

This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-5:ed-1:v1:en

ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General

The goal of a non-repudiation service is to generate, collect, maintain, make available and verify evi­dence concerning a claimed event or action in order to re­solve dis­putes about the occurrence or non occurrence of the event or action. 
Non-repudiation services establish evidence; evidence es­tablishes accountability regarding a particular event or action. The entity responsible for the action, or associated with the event, with regard to which evi­dence is generated, is known as the evidence subject.
This part of ISO/IEC 13888 serves as a general model for subsequent parts specifying non-repudia­tion mechanisms using cryptographic techniques. ISO/IEC 13888 provides non-repudiation mechanisms for the following phases of non-repudiation:

— evidence generation;

— evidence transfer, storage and retrieval; and

— evidence verification.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:13888:-1:ed-3:v1:en

ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements

 

This International Standard specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This International Standard also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en

ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls

This International Standard gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization’s information security risk environment(s).

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27002:ed-2:v1:en

For Television Analog Recording — Frequency Response and Operating Level of Recorders and Reproducers — Audio 1 Record on 2-in Tape Operating at 15 and 7.5 in/s

This standard specifies the frequency response and operating level for recorders and reproducers for audio 1 record for 2-in quadruplex video magnetic tape recording at 15 in/s and 7.5 in/s (381 mm/s and 190.5 mm/s), as defined in ANSI/SMPTE 6. It also specifies the field method of calibration of recorders and reproducers, utilizing the test tapes as defined in ANSI/SMPTE 8 and ANSI/SMPTE 11.

SMPTE ST 3:1998

For Television Analog Recording — 1-in Type C — Basic System and Transport Geometry Parameters

This standard specifies the general video record system, video pole tip locations, scanner parameters, scanner-guide locations, tape tension, and test conditions for 1-in type C helical-scan television analog recorders operating on the 525/60 monochrome or NTSC color systems.

SMPTE ST 18:2003