Standard
Available (268)
Showing 205 - 216 per page
Standard
IEEE 1667-2006 - C/CPSC - IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices
Cryptographic and data authentication procedures for storage devices that support lengt...Standard
IEEE 1619.1-2007 - C/CPSC - IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices
This standard specifies cryptographic and data authentication procedures for storage de...Standard
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common i...Standard
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interp...Standard
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods ...Standard
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities. ...Standard
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling di...Standard
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security s...Standard
ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements
This International Standard specifies the requirements for establishing, implementin...Standard
ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary
This document provides the overview of information security management systems (ISMS)....Standard