
【国际标准】 Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
本网站 发布时间:
2025-02-18
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>

适用范围:
暂无
标准号:
ISO/IEC 27004:2016 EN
标准名称:
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
英文名称:
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation标准状态:
现行-
发布日期:
2016-12-15 -
实施日期:
出版语种:
EN
- 推荐标准
- ISO/TR 23249:2022 EN cde6735a Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management
- ISO/TR 6039:2023 EN e3a81731 Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems
- ISO/TR 6277:2024 EN 58a454e8 Blockchain and distributed ledger technologies — Data flow models for blockchain and DLT use cases
- ISO/TS 23258:2021 EN 2da5874d Blockchain and distributed ledger technologies — Taxonomy and Ontology
- ISO/TS 23635:2022 EN bddb24ca Blockchain and distributed ledger technologies — Guidelines for governance
- ISO 23257:2022 EN 34ace5ae Blockchain and distributed ledger technologies — Reference architecture
- ISO/IEC 11770-3:2015/AMD1:2017 EN a15284c6 Amendment 1 - Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques - Blinded Diffie-Hellman key agreement
- ISO/IEC 11770-3:2021 EN 67617351 Information security - Key management - Part 3: Mechanisms using asymmetric techniques
- ISO/IEC 11770-4:2017 EN 7498fd5a Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
- ISO/IEC 11770-4:2017/AMD2:2021 EN 0f66ccc6 Amendment 2 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Leakage-resilient password-authenticated key agreement with additional stored secrets
- ISO/IEC 11770-6:2016 EN c2fa2fe3 Information technology — Security techniques — Key management — Part 6: Key derivation
- ISO/IEC 11770-7:2021 EN f41fed1a Information security — Key management — Part 7: Cross-domain password-based authenticated key exchange
- ISO/IEC 11889-1:2009 EN b9df0a76 Information technology — Trusted Platform Module — Part 1: Overview
- ISO/IEC 11889-1:2015 EN b6f30849 Information technology — Trusted platform module library — Part 1: Architecture
- ISO/IEC 11889-3:2009 EN 15e584c8 Information technology — Trusted Platform Module — Part 3: Structures