35.030 - IT Security
IT Security
Sécurité des technologies de l’information
Informacijska varnost
General Information
- Draft17 pagesEnglish language
sale 15% off
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization. The intended audience for this document is: — governing body and top management; — those who are responsible for evaluating, directing and monitoring an information security management system (ISMS) based on ISO/IEC 27001; — those responsible for in...view more
- Standard16 pagesEnglish language
sale 15% off- Draft16 pagesEnglish language
sale 15% off- Draft15 pagesEnglish language
sale 15% off
This document discusses the threats, risks, and controls related to: — systems that provide digital asset custodian services and/or exchange services to their customers (consumers and businesses) and management of security when an incident occurs; — asset information (including the signature key of the digital asset) that a custodian of digital assets manages. This document is addressed to digital asset custodians that manage signature keys associated with digital asset accounts. In such a case,...view more
- Draft35 pagesEnglish language
sale 15% off- Technical report35 pagesEnglish language
sale 15% off
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF. Amongst PUF use cases, random number generation is out of scope in this document.
- Draft16 pagesEnglish language
sale 15% off- Standard16 pagesEnglish language
sale 15% off- Draft16 pagesEnglish language
sale 15% off
This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups: — probabilistic primality tests, which have a small error probability. All probabilistic tests described here can declare a composite to be a prime; — deterministic methods, which are guaranteed to give the righ...view more
- Standard33 pagesEnglish language
sale 15% off- Draft33 pagesEnglish language
sale 15% off- Draft36 pagesEnglish language
sale 15% off
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: — data confidentiality, i.e. protection against unauthorized disclosure of data; — data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; — data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All five methods specified i...view more
- Standard26 pagesEnglish language
sale 15% off- Draft25 pagesEnglish language
sale 15% off
This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines: — symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC); and — symmetric key establishment mechanisms based on a general tree-based logical key structure with both individual rekeying and batch rekeying. It also defines key establishment mechanisms based on a key chain with group forward secrecy, group backward secrecy or both group f...view more
- Draft18 pagesEnglish language
sale 15% off- Standard18 pagesEnglish language
sale 15% off- Draft18 pagesEnglish language
sale 15% off
This part of IEC 62443 establishes requirements for:
• defining a system under consideration (SUC) for an industrial automation and control
system (IACS);
• partitioning the SUC into zones and conduits;
• assessing risk for each zone and conduit;
• establishing the target security level (SL-T) for each zone and conduit; and
• documenting the security requirements.
- Standard34 pagesEnglish language
sale 10% off- e-Library read for1 day
This document describes test methods for determining the conformance of security crypto suites defined in ISO/IEC 29167-16. This document contains conformance tests for all mandatory and applicable optional functions. The conformance parameters are the following: — parameters that apply directly affecting system functionality and inter-operability; — protocol including commands and replies; — nominal values and tolerances. Unless otherwise specified, the tests in this document are to be applied ...view more
- Standard21 pagesEnglish language
sale 15% off- Draft21 pagesEnglish language
sale 15% off
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series. It provides requirements and recommendations to the developer and the evaluator for the supplementary activities on biometric recognition performance specified in ISO/IEC 19989-1. The evaluation of presentation attack detection techniques is out of the scope of this document ex...view more
- Standard33 pagesEnglish language
sale 15% off- Draft42 pagesEnglish language
sale 15% off
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: — extended security functional components to SFR Classes in ISO/IEC 15408-2; — supplementary activities to methodology specified in ISO/IEC 18045 for SAR Classes of ISO/IEC 15408-3. This document introduces the general framework for the security evaluation of biometric systems, including extended security fu...view more
- Standard62 pagesEnglish language
sale 15% off- Draft83 pagesEnglish language
sale 15% off
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides recommendations and requirements to the developer and the evaluator for the supplementary activities on presentation attack detection specified in ISO/IEC 19989-1. This document is applicable only to TOEs for single biometric characteristic type but for the selection of a c...view more
- Standard18 pagesEnglish language
sale 15% off- Draft25 pagesEnglish language
sale 15% off
This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and technology perspective. It then further focuses on information security incident response in ICT security operations including information security incident detection, reporting, triage, analysis, response, containment, eradication, recovery and conclusion. This document is...view more
- Standard31 pagesEnglish language
sale 15% off- Draft32 pagesEnglish language
sale 15% off
This document serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques. The ISO/IEC 13888 series provides non-repudiation mechanisms for the following phases of non-repudiation: — evidence generation; — evidence transfer, storage and retrieval; and — evidence verification. Dispute arbitration is outside the scope of the ISO/IEC 13888 series.
- Standard20 pagesEnglish language
sale 15% off- Draft20 pagesEnglish language
sale 15% off
This document specifies mechanisms for the provision of specific, communication-related, non‑repudiation services using asymmetric cryptographic techniques.
- Standard13 pagesEnglish language
sale 15% off- Draft14 pagesEnglish language
sale 15% off
- Standard12 pagesEnglish language
sale 15% off- Draft11 pagesEnglish language
sale 15% off
The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of
information security controls in telecommunications organizations.
The adoption of this Recommendation | International Standard will allow telecommunications organizations to meet
baseline information security management requirements of confidentiality, integrity, availability and any other relevant
security property.
- Standard41 pagesEnglish language
sale 10% off- e-Library read for1 day
- Draft37 pagesEnglish language
sale 10% off- e-Library read for1 day
This document provides requirements and recommendations to vendors on the disclosure of
vulnerabilities in products and services. Vulnerability disclosure enables users to perform technical
vulnerability management as specified in ISO/IEC 27002:2013, 12.6.1[1]. Vulnerability disclosure helps
users protect their systems and data, prioritize defensive investments, and better assess risk. The goal
of vulnerability disclosure is to reduce the risk associated with exploiting vulnerabilities. Coor...view more
- Standard42 pagesEnglish language
sale 10% off- e-Library read for1 day
- Draft39 pagesEnglish language
sale 10% off- e-Library read for1 day
This document provides requirements and recommendations for how to process and remediate reported potential vulnerabilities in a product or service.
This document is applicable to vendors involved in handling vulnerabilities.
- Standard21 pagesEnglish language
sale 10% off- e-Library read for1 day
- Draft18 pagesEnglish language
sale 10% off- e-Library read for1 day
This International Standard provides a privacy framework which
- specifies a common privacy terminology;
- defines the actors and their roles in processing personally identifiable information (PII);
- describes privacy safeguarding considerations; and
- provides references to known privacy principles for information technology.
This International Standard is applicable to natural persons and organizations involved in specifying,
procuring, architecting, designing, developing, testing, main...view more
- Standard37 pagesEnglish language
sale 10% off- e-Library read for1 day
- Standard37 pagesEnglish language
sale 10% off- e-Library read for1 day
- Draft34 pagesEnglish language
sale 10% off- e-Library read for1 day