Made available to the public under the provisions of the Bureau of Indian Standards Act of 1986 and the Right to Information Act of 2005. In order to promote public education and public safety, equal justice for all, a better informed citizenry, the rule of law, world trade and world peace, this legal document is hereby made available on a noncommercial basis, as it is the right of all humans to know and speak the laws that govern them.
Division Name: Electronics and Information Technology
Section Name: Information Systems Security and Biometrics (LITD 17)
Standard | Year | Title | IBR |
---|---|---|---|
IS 14356 (pdf) IS 14356 (txt) | 1996 | Guide for protection of information resources | |
IS 14990-1 (pdf) IS 14990-1 (txt) | 2006 | Information Technology - Security Techniques - Evaluation Criteria for IT Security, Part 1: Introduction and General Model | ISO/IEC 15408-1 |
IS 14990-2 (pdf) IS 14990-2 (txt) | 2006 | Information Technology - Security Techniques - Evaluation Criteria for it Security, Part 2: Security Functional Requirements | ISO/IEC 15408-2 |
IS 14990-3 (pdf) IS 14990-3 (txt) | 2006 | Information Technology - Security Techniques - Evaluation Criteria of it Security, Part 3: Security Assurance Requirements | ISO/IEC 15408-3 |
IS 15116 (pdf) IS 15116 (txt) | 2012 | Information Technology - Security Techniques - Modes of Operation for An n-Bit Block Cipher | ISO/IEC 10116:2006 |
IS 15580 (pdf) IS 15580 (txt) | 2005 | Information Technology - Systems Security Engineering - Capability Maturity Model (SSE-CMM) | |
IS 15671 (pdf) IS 15671 (txt) | 2006 | Information technology - Security techniques - Methodology for it security evaluation | ISO/IEC 18045 |
IS/ISO/IEC 9796-2 (pdf) | 2002 | Information Technology - Security Techniques - Digital Signature Schemes giving Message Recovery, Part 2: Integer Factorization based Mechanisms | ISO/IEC9796-2:2002 |
IS/ISO/IEC 13335-1 (pdf) IS/ISO/IEC 13335-1 (txt) | 2004 | Information Technology - Security Techniques - Management of Information and Communications Technology Security, Part 1: Concepts and Models for Information and Communications Technology Security Management | |
IS/ISO/IEC 17799 (pdf) | 2005 | Information Technology_ Code of practice for Information Security Management | |
IS/ISO/IEC 27001 (pdf) IS/ISO/IEC 27001 (txt) | 2005 | Information Technology- Security techniques- Information Security Management System- Requirement | |
IS/ISO/IEC 27006 (pdf) IS/ISO/IEC 27006 (txt) | 2007 | Information Technology - Security Techniques - Requirements for Bodies Providing Audit and Certification of Information Security Management Systems |
Last Updated: September 6, 2013
↑