Standards Watch

  • Home
  • Standards Watch

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

The Standards Watch of StandICT.eu monitors the status of ICT standards at international level, starting from the five priority areas of the Digital Single Market: 5G communications,cloud computing,cybersecurity,data technology, and IoT – Internet of Things.

In particular, special attention is given to the rapidly evolving ICT topics of: Artificial Intelligence, Big Data, IoT. Gradually, the Standards Watch will be expanded to other ICT domains and topics, with the aim of better identifying gaps, needs & opportunities and consequently stimulating European Experts to pursue the openings granted by the StandICT.eu initiative.

This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evaluation specialists, thereby establishing a basis for shared understanding of the concepts and principles central to the ISO/IEC 19896 series across its user communities. It provides fundamental information to users of the ISO/IEC 19896 series.

Thursday, February 1, 2018
Want to flag something? Write here in the WikiWatch

Read more

This International Standard specifies the subjects to be addressed during a security evaluation of a biometric system.
It covers the biometric-specific aspects and principles to be considered during the security evaluation of a biometric system. It does not address the non-biometric aspects which might form part of the overall security evaluation of a system using biometric technology (e.g. requirements on databases or communication channels).

Saturday, August 1, 2009
Want to flag something? Write here in the WikiWatch

Read more

This Technical Report provides guidance and criteria for the security evaluation of operational systems. It provides an extension to the scope of ISO/IEC 15408, by taking into account a number of critical aspects of operational systems not addressed in ISO/IEC 15408 evaluation. The principal extensions that are required address evaluation of the operational environment surrounding the target of evaluation, and the decomposition of complex operational systems into security domains that can be separately evaluated.

Thursday, April 1, 2010
Want to flag something? Write here in the WikiWatch

Read more

ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g.

Wednesday, August 1, 2012
Want to flag something? Write here in the WikiWatch

Read more

This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
— data confidentiality, i.e. protection against unauthorized disclosure of data,
— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified,
— data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.

Sunday, February 1, 2009
Want to flag something? Write here in the WikiWatch

Read more

This document provides guidance for:
— selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII);
— the procedure to define both privacy and security functional requirements in a coordinated manner; and
— developing privacy functional requirements as extended components based on the privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2.

Monday, October 1, 2018
Want to flag something? Write here in the WikiWatch

Read more

ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their properties. This document defines the parties involved in a secret sharing scheme, the terminology used in the context of secret sharing schemes, the parameters and the properties of such a scheme.

Tuesday, November 1, 2016
Want to flag something? Write here in the WikiWatch

Read more

This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those principles effectively.
This document gives guidelines for the development of secure products, systems and applications including a more effective assessment with respect to the security properties they are supposed to implement.
This document does not establish any requirements for the evaluation or the assessment process or implementation.

Friday, October 1, 2010
Want to flag something? Write here in the WikiWatch

Read more

Pages