Specifies a continual performance improvement (CPI) methodology and its major
elements, which extend the already-defined continual improvement process (TEN8) in ISO/IEC 30105-1...
specifies six methods for authenticated encryption, i.e. defined ways of processing
a data string with the following security objectives:
o data confidentiality, i.e. protection against unauthorized disclosure of data,..
provides a privacy framework which
- specifies a common privacy terminology;
- defines the actors and their roles in processing personally identifiable information (PII);
- describes privacy safeguarding considerations; and
- provides references ..
specifies four mechanisms for signcryption that employ public key cryptographic
techniques requiring both the originator and the recipient of protected data to have their own public and
private key pairs..
Defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles..
defines a process reference model comprising a set of processes, described in
terms of process purpose and outcomes that demonstrate coverage of the requirements of ISO/IEC 20000-1...