"Information security," CNS Standards List| Copper copper | Corrugated Steel | Method Test | Method test | Document management | 250V PVC | Clinical Thermometers | Disposable plastics | |
|
CNS 27001
2023 Edition Information security, cybersecurity and privacy protection − Information security management systems − Requirements 資訊安全ã€ç¶²å®‡å®‰å…¨åŠéš±ç§ä¿è·ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ç³»çµ±ï¼è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27002
2023 Edition Information security, cybersecurity and privacy protection − Information security controls 資訊安全ã€ç¶²å®‡å®‰å…¨åŠéš±ç§ä¿è·ï¼è³‡è¨Šå®‰å…¨æŽ§åˆ¶æŽªæ–½ |
![]() |
|
|
CNS 62351-4
2022 Edition Power systems management and associated information exchange − Data and communications security − Part 4: Profiles including MMS and derivatives 電力系統管ç†åŠé—œè¯è³‡è¨Šäº¤æ›ï¼è³‡æ–™åŠé€šè¨Šå®‰å…¨ï¼ç¬¬4部:包括MMSåŠè¡ç”Ÿä¹‹å‰–繪 |
![]() |
|
|
CNS 27018
2021 Edition Information technology − Security techniques − Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å…¬ç”¨é›²PII 處ç†è€…ä¿è·å€‹äººå¯è˜åˆ¥è³‡è¨Š(PII)之作æ¥è¦ç¯„ |
![]() |
|
|
CNS 29191
2021 Edition Information technology − Security techniques − Requirements for partially anonymous, partially unlinkable authentication 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éƒ¨åˆ†åŒ¿ååŠéƒ¨åˆ†åŽ»é€£çµé‘‘別之è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27002
2021 Edition Information technology − Security techniques − Code of practice for Information security controls 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨æŽ§åˆ¶æŽªæ–½ä¹‹ä½œæ¥è¦ç¯„ |
![]() |
|
|
CNS 27000
2021 Edition Information technology – Security techniques – Information security management systems – Overview and vocabulary 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ç³»çµ±ï¼æ¦‚觀åŠè©žå½™ |
![]() |
|
|
CNS 3254
2021 Edition Power systems management and associated information exchange − Data and communications security − Part 6: Security for CNS 61850 動力脫穀機 |
![]() |
|
|
CNS 15874-3
2021 Edition Power systems management and associated information exchange − Data and communications security − Part 2: Glossary of terms 電力系統管ç†åŠé—œè¯è³‡è¨Šäº¤æ›ï¼è³‡æ–™åŠé€šè¨Šå®‰å…¨ï¼ç¬¬3 部:通訊網路åŠç³»çµ±å®‰å…¨ï¼åŒ…括TCP/IP 之剖繪 |
![]() |
|
|
CNS 15408-1
2021 Edition Information security, cybersecurity and privacy protection − Evaluation criteria for IT security − Part 1: Introduction and general model 資訊安全ã€ç¶²å®‡å®‰å…¨åŠéš±ç§ä¿è·ï¼IT安全之評估準則ï¼ç¬¬1部:簡介åŠä¸€èˆ¬æ¨¡åž‹ |
![]() |
|
|
CNS 27016
2021 Edition Information technology − Security techniques − Information security management − Organizational economics 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ï¼çµ„ç¹”ç¶“æ¿Ÿå¸ |
![]() |
|
|
CNS 15408-2
2021 Edition Information security, cybersecurity and privacy protection − Evaluation criteria for IT security − Part 2: Security functional component 資訊安全ã€ç¶²å®‡å®‰å…¨åŠéš±ç§ä¿è·ï¼IT安全之評估準則ï¼ç¬¬2部:安全功能組件 |
![]() |
|
|
CNS 15408-3
2021 Edition Information security, cybersecurity and privacy protection − Evaluation criteria for IT security − Part 3: Security assurance components 資訊安全ã€ç¶²å®‡å®‰å…¨åŠéš±ç§ä¿è·ï¼IT安全之評估準則ï¼ç¬¬3部:安全ä¿è‰çµ„件 |
![]() |
|
|
CNS 15408-5
2021 Edition Information security, cybersecurity and privacy protection − Evaluation criteria for IT security − Part 5: Pre-defined packages of security requirements 資訊安全ã€ç¶²å®‡å®‰å…¨åŠéš±ç§ä¿è·ï¼IT安全之評估準則ï¼ç¬¬5部:安全è¦æ±‚äº‹é …ä¹‹é 先定義套件 |
![]() |
|
|
CNS 15408-4
2021 Edition Information security, cybersecurity and privacy protection − Evaluation criteria for IT security − Part 4: Framework for the specification of evaluation methods and activities 資訊安全ã€ç¶²å®‡å®‰å…¨åŠéš±ç§ä¿è·ï¼IT安全之評估準則ï¼ç¬¬4部:評估方法åŠæ´»å‹•ä¹‹è¦æ ¼æ¡†æž¶ |
![]() |
|
|
CNS 19086-4
2021 Edition Information technology − Cloud computing − Service level agreement (SLA) framework − Part 4: Components of security and of protection of PII 資訊技術ï¼é›²ç«¯é‹ç®—ï¼æœå‹™æ°´æº–å”è°(SLA)框架ï¼ç¬¬4部:安全組æˆé …ç›®åŠPIIä¿è·çµ„æˆé …ç›® |
![]() |
|
|
CNS 27701
2020 Edition Security techniques − Extension to CNS 27001 and CNS 27002 for privacy information management − Requirements and guidelines 安全技術ï¼ç”¨æ–¼éš±ç§è³‡è¨Šç®¡ç†ä¹‹CNS 27001åŠCNS 27002延伸ï¼è¦æ±‚äº‹é …åŠæŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 29100-2
2019 Edition Information technology − Security techniques − Requirements for a personal information de-identification process management system 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å€‹äººè³‡è¨ŠåŽ»è˜åˆ¥åŒ–éŽç¨‹ç®¡ç†ç³»çµ±ï¼è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27005
2019 Edition Information technology − Security techniques − Information security risk management 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨é¢¨éšªç®¡ç† |
![]() |
|
|
CNS 27001
2019 Edition Information technology − Security techniques − Information security management systems − Requirements 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ç³»çµ±ï¼è¦æ±‚äº‹é … |
![]() |
|
|
CNS 29100
2019 Edition Information technology − Security techniques − Privacy framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éš±ç§æ¬Šæ¡†æž¶ |
![]() |
|
|
CNS 29151
2019 Edition Information technology − Security techniques − Code of practice for personally identifiable information protection 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å€‹äººå¯è˜åˆ¥è³‡è¨Šä¿è·ä¹‹ä½œæ¥è¦ç¯„ |
![]() |
|
|
CNS 14929-4
2019 Edition Information technology - Guidelines for the management of IT security - Part 4: Selection of safeguards 資訊技術ï¼è³‡è¨ŠæŠ€è¡“安全管ç†æŒ‡å°Žç¶±è¦ï¼ç¬¬4部:ä¿è·æŽªæ–½ä¹‹é¸æ“‡ |
![]() |
|
|
CNS 14929-3
2019 Edition Information technology - Guidelines for the management of IT security - Part 3: Techniques for the management of IT security 資訊技術ï¼è³‡è¨ŠæŠ€è¡“安全管ç†æŒ‡å°Žç¶±è¦ï¼ç¬¬3部:資訊技術安全管ç†ä¹‹æŠ€è¡“ |
![]() |
|
|
CNS 29134
2019 Edition Information technology − Security techniques − Guidelines for privacy impact assessment 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éš±ç§è¡æ“Šè©•é‘‘ä¹‹æŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 29100-1
2019 Edition Information technology − Security techniques − Specification for a personal information management system 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å€‹è³‡ç®¡ç†ç³»çµ±è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27003
2019 Edition Information technology − Security techniques − Information security management system implementation guidance 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ç³»çµ±å¯¦ä½œæŒ‡å¼• |
![]() |
|
|
CNS 14381-3
2019 Edition Information technology - Security techniques - Key management - Part 3 : Mechanism using asymmetric techniques 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼é‡‘鑰管ç†ï¼ç¬¬ï¼“部:使用éžå°ç¨±æŠ€è¡“的機制 |
![]() |
|
|
CNS 14929-5
2019 Edition Information technology - Guidelines for the management of IT security - Part 5: Management guidance on network security 資訊技術ï¼è³‡è¨ŠæŠ€è¡“安全管ç†æŒ‡å°Žç¶±è¦ï¼ç¬¬5部:網路安全管ç†æŒ‡å¼• |
![]() |
|
|
CNS 15215
2019 Edition Information technology - Security techniques - Information security incident management è³‡è¨ŠæŠ€è¡“â€”å®‰å…¨æŠ€è¡“â€”è³‡è¨Šå®‰å…¨äº‹æ•…ç®¡ç† |
![]() |
Find out:92Items | To Page of: First -Previous-Next -Last | 1 2 3 4 |