Electrotechincal

Electrotechincal



KS ISO/IEC18045:2022

Information security, cybersecurity and privacy protection Evaluation criteria for IT security Methodology for IT security evaluation

Defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series...

Kes 20,110.00

KS ISO/IEC 15408-2:2022

Information security, cybersecurity and privacy protection Evaluation criteria for IT security Part 2: Security functional components

Defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products...

Kes 20,110.00

KS ISO/IEC 20897-2:2022

Information security, cybersecurity and privacy protection Physically unclonable functions Part 2: Test and evaluation methods

specifies the test and evaluation methods for physically unclonable functions (PUFs). ..

Kes 3,605.00

KSISO/IECTS23532-1:2021

Information security, cybersecurity and privacy protection Requirements for the competence of IT security testing and evaluation laboratories Part 1: Evaluation for ISO/IEC 15408

Complements and supplements the procedures and general requirements found in ISO/IEC 17025:2017 for laboratories performing evaluations based on the ISO/IEC 15408 series and ISO/IEC 18045..

Kes 3,437.00

KS ISO/IECTS 23532-2:2021

Information security, cybersecurity and privacy protection Requirements for the competence of IT security testing and evaluation laboratories Part 2: Testing for ISO/IEC 19790

complements and supplements the procedures and general requirements found in ISO/IEC 17025:2017 for laboratories performing testing based on ISO/IEC 19790 and ISO/IEC 24759...

Kes 3,605.00

KS ISO/IEC TR24485:2022

Information security, cybersecurity and privacy protection Security techniques Security properties and best practices for test and evaluation of white box cryptography

Introduces security properties and provides best practices on the test and evaluation of white box cryptography (WBC)...

Kes 3,167.00

KSISOIEC 27554:2024

Information security, cybersecurity and privacy protection - Application of ISO 31000 for assessment of identity-related risk

Provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for proce..

Kes 3,308.00

KS ISO/IEC27557:2022

Information security, cybersecurity and privacy protection - Application of ISO 31000:2018 for organizational privacy risk management

Provides guidance to organizations for integrating risks related to the processing of personally identifiable information (PII) as part of an organizational privacy risk management programme...

Kes 3,308.00

Showing 811 to 820 of 913 (92 Pages)