Standards Watch

  • Home
  • Standards Watch

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

The Standards Watch of StandICT.eu monitors the status of ICT standards at international level, starting from the five priority areas of the Digital Single Market:

  • 5G communications,
  • cloud computing,
  • cybersecurity,
  • data technology, and
  • IoT – Internet of Things.

In particular, special attention is given to the rapidly evolving ICT topics of:

  • Artificial Intelligence,
  • Big Data,
  • IoT.
Gradually, the Standards Watch will be expanded to other ICT domains and topics, with the aim of better identifying gaps, needs & opportunities and consequently stimulating European Experts to pursue the openings granted by the StandICT.eu initiative.

ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence

This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to aid understanding of an incident. The exact nature of the data and information making up the potential digital evidence will depend on the nature of the incident and the digital evidence sources involved in that incident.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method

This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements

 

This International Standard specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This International Standard also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General

The goal of a non-repudiation service is to generate, collect, maintain, make available and verify evi­dence concerning a claimed event or action in order to re­solve dis­putes about the occurrence or non occurrence of the event or action. 
Non-repudiation services establish evidence; evidence es­tablishes accountability regarding a particular event or action. The entity responsible for the action, or associated with the event, with regard to which evi­dence is generated, is known as the evidence subject.


Available in the insights page:

Go to the insights page

Pages