Electrotechincal
Electrotechincal
KS ISOIEC9798-4:1999
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
Specifies entity authentication mechanisms using a cryptographic check function..
Kes 2,307.00
KS ISO/IEC27014:2020
Information technology - Security techniques - Governance of information security.
Provides guidance on concepts and principles for the governance of information security, by which organisations can evaluate, direct, monitor and communicate the information security related activities within the organisation...
Kes 2,647.00
KS ISO/IEC27041:2015
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method.
Provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are fit for purpose...
Kes 2,647.00
KS ISOIEC 27032:2012
Information technology - Security techniques - Guidelines for cybersecurity
provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular:..
Kes 4,696.00
KS ISOIEC 27031:2011
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
This International Standard describes the concepts and principles of information and communication technology (ICT) readiness for business continuity, and provides a framework of methods and processes to identify and specify all aspects (such as pe..
Kes 4,326.00
KS ISOIEC 24762:2008
Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services.
Describes the basic practices which ICT DR service providers, both in-house and outsourced, should consider..
Kes 5,222.00
KS ISO/IEC27042:2015
Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence.
Provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability...
Kes 2,533.00
KS ISO/IECTR 14516:2002
Information technology - Security techniques - Guidelines for the use and management of trusted third party services
Associated with the provision and operation of a trusted third party (TTP) are anumber of security-related issues for which general guidance is necessary to assist business entities, developers and relationships of TTPs and the entities using TTP AND..
Kes 3,090.00
KS ISO/IEC 10118-2:2010
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
specifies hash-functions which make use of an n-bit block cipher algorithm...
Kes 2,966.00
KS ISO/IEC 10118-4:1998
Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic
specifies two hash-functions which make use of modular arithmetic...
Kes 2,750.00