"security " CNS Standards List |
|
CNS 15134-3
2019 Edition Information technology - security techniques - IT network security - Part 3 : Securing communications between networks using security gateways 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“網路安全ï¼ç¬¬ï¼“部:使用安全閘é“之網路間的安全通訊 |
![]() |
|
|
CNS 14929-5
2019 Edition Information technology - Guidelines for the management of IT security - Part 5: Management guidance on network security 資訊技術ï¼è³‡è¨ŠæŠ€è¡“安全管ç†æŒ‡å°Žç¶±è¦ï¼ç¬¬5部:網路安全管ç†æŒ‡å¼• |
![]() |
|
|
CNS 15234-1
2019 Edition Information technology - security techniques - Cryptographic techniques based on elliptic curves - Part 1: General 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼‘部:一般 |
![]() |
|
|
CNS 14992
2019 Edition Information technology - security techniques - IT intrusion detection framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“入侵åµæ¸¬æ¡†æž¶ |
![]() |
|
|
CNS 14929-1
2019 Edition Information technology - security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šèˆ‡é€šè¨ŠæŠ€è¡“安全管ç†ï¼ç¬¬1部:資訊與通訊技術安全管ç†æ¦‚念與模型 |
![]() |
|
|
CNS 15653
2019 Edition Information technology − security techniques − Guidelines for information and communications technology disaster recovery services 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šèˆ‡é€šè¨ŠæŠ€è¡“ç½å®³å¾©åŽŸæœå‹™æŒ‡å¼• |
![]() |
|
|
CNS 15135
2019 Edition Information technology - security techniques - Security requirements for cryptographic modules 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å¯†ç¢¼æ¨¡çµ„安全è¦æ±‚ |
![]() |
|
|
CNS 15234-2
2019 Edition Information technology - security techniques - Cryptographic techniques based on elliptic curves - Part 2: Digital signatures 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼’部:數ä½ç°½ç« |
![]() |
|
|
CNS 15234-3
2019 Edition Information technology - security techniques - Cryptographic techniques based on elliptic curves - Part 3: Key establishment 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼“部:金鑰建立 |
![]() |
|
|
CNS 15133
2019 Edition Information technology - security techniques - Guidelines for the use and management of Trusted Third Party services 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å—信賴第三方æœå‹™çš„使用與管ç†ä¹‹æŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 15234-4
2019 Edition Information technology - security techniques - Cryptographic techniques based on elliptic curves - Part 4: Digital signatures giving message recovery 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼”部:具訊æ¯å¾©åŽŸä¹‹æ•¸ä½ç°½ç« |
![]() |
|
|
CNS 27001
2019 Edition Information technology − security techniques − Information security management systems − Requirements 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ç³»çµ±ï¼è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27010
2019 Edition Information technology − security techniques − Information security management for inter-sector and inter-organizational communications 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è·¨éƒ¨é–€åŠè·¨çµ„ç¹”é€šè¨Šä¹‹è³‡è¨Šå®‰å…¨ç®¡ç† |
![]() |
|
|
CNS 14381-1
2019 Edition Information technology - security techniques - Key management-Part 1 : Framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼é‡‘鑰管ç†ï¼ç¬¬ï¼‘部:框架 |
![]() |
|
|
CNS 27014
2019 Edition Information technology − security techniques − Governance of information security 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨æ²»ç† |
![]() |
|
|
CNS 6263-8
2019 Edition Method of Test for Strollers and Carriages(Test for security of Wheel) 手推嬰幼兒車檢驗法(車輪安全性試驗) |
![]() Translated |
|
|
CNS 13936-3
2018 Edition Financial transaction cards-security architecture of financial transaction systems using integrated circuit cards-Part3:Cryptographic key relationships 金èžäº¤æ˜“å¡--使用ICå¡ä¹‹é‡‘èžäº¤æ˜“系統安全架構--第3部:密碼金鑰關係 |
![]() |
|
|
CNS 27036-2
2018 Edition Information technology − security techniques − Information security for supplier relationships − Part 2: Requirements 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ä¾›æ‡‰è€…關係資訊安全ï¼ç¬¬2部:è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27019
2018 Edition Information technology − security techniques − Information security management guidelines based on CNS 27002 for process control systems specific to the energy utility industry 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ä¾æ“šCNS 27002 之能æºå…¬ç”¨äº‹æ¥ç‰¹å®šç¨‹åºæŽ§åˆ¶ç³»çµ±ç”¨è³‡è¨Šå®‰å…¨ç®¡ç†æŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 27009
2018 Edition Information technology − security techniques − Sector-specific application of CNS 27001 − Requirements 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼CNS 27001之產æ¥ç‰¹å®šæ‡‰ç”¨ï¼è¦æ±‚äº‹é … |
![]() |
|
|
CNS 13283-9
2018 Edition Electronic data interchange for administration,commerce and transport (EDIFACT)-Application level syntax rules(Syntax version number:4)-Part9:security key and certificate management message (Message type-KEYMAN) 行政管ç†ã€å•†å‹™èˆ‡é‹è¼¸ç”¨é›»å資料交æ›ï¼ˆï¼¥ï¼¤ï¼©ï¼¦ï¼¡ï¼£ï¼´ï¼‰ï¼æ‡‰ç”¨å±¤èªžæ³•è¦å‰‡ï¼ˆç¬¬ï¼”版語法)ï¼ç¬¬ï¼™éƒ¨ï¼šå®‰å…¨é‡‘鑰與憑è‰ç®¡ç†è¨Šæ¯ï¼ˆè¨Šæ¯åž‹å¼ï¼ï¼«ï¼¥ï¼¹ï¼ï¼¡ï¼®ï¼‰ |
![]() |
|
|
CNS 12717
2018 Edition Information technology - Vocabulary - Part 8:security 資訊技術ï¼è©žå½™ï¼ç¬¬ï¼˜éƒ¨ï¼šå®‰å…¨ |
![]() |
|
|
CNS 13798-1
2018 Edition Banking-Personal Identification Number Management and security-Part 1:PIN Protection Principles and Techniques 銀行æ¥â€“個人è˜åˆ¥ç¢¼ç®¡ç†èˆ‡å®‰å…¨ï¼ˆç¬¬ä¸€éƒ¨ï¼šå€‹äººè˜åˆ¥ç¢¼ä¿è·ä¹‹åŽŸå‰‡èˆ‡æŠ€è¡“) |
![]() |
|
|
CNS 20858
2018 Edition Ships and marine technology - Maritime port facility security assessments and security plan development 船舶與航é‹æŠ€è¡“ï¼æµ·é‹æ¸¯å£è¨æ–½ä¹‹å®‰å…¨è©•é‘‘與安全計畫擬定 |
![]() |
|
|
CNS 14510-2
2018 Edition Information technology-security techniques-Non-repudiation Part2:Mechanisms using symmetric techniques 資訊技術-安全技術-ä¸å¯å¦èªæ€§-第2部:使用å°ç¨±æŠ€è¡“之機制 |
![]() |
|
|
CNS 13936-1
2018 Edition Financial transaction cards-security architecture of financial transaction systems using integrated circuit cards-Part 1:Card life cycle 金èžäº¤æ˜“å¡â€“使用ICå¡çš„金èžäº¤æ˜“系統下的安全架構;第1部:ICå¡ç”Ÿå‘½é€±æœŸ |
![]() |
|
|
CNS 13936-6
2018 Edition Financial transaction cards-security architecture of financial transaction systems using integrated circuit cards-Part 6:Cardholder Verification 金èžäº¤æ˜“å¡â€“使用ICå¡çš„金èžäº¤æ˜“系統下的安全架構;第6部:æŒå¡è€…é©—è‰ |
![]() |
|
|
CNS 27006
2018 Edition Information technology − security techniques − Requirements for bodies providing audit and certification of information security management systems 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼æ供資訊安全管ç†ç³»çµ±ç¨½æ ¸èˆ‡é©—è‰æ©Ÿæ§‹ 之è¦æ±‚ |
![]() |
|
|
CNS 14334-5
2018 Edition Information technology - Open systems interconnection - security frameworks for open systems: Confidentiality framework 資訊技術ï¼é–‹æ”¾ç³»çµ±äº’連ï¼é–‹æ”¾ç³»çµ±ä¹‹å®‰å…¨æ¡†æž¶ï¼šæ©Ÿå¯†æ€§æ¡†æž¶ |
![]() |
|
|
CNS 13936-4
2018 Edition Financial transaction cards - security architecture of financial transaction systems using integrated circuit cards - Part 4: Secure application modules 金èžäº¤æ˜“å¡ï¼ä½¿ç”¨ICå¡é‡‘èžäº¤æ˜“系統的安全çµæ§‹ï¼ç¬¬4部:安全應用模組 |
![]() |
Find out:140Items | To Page of: First -Previous-Next -Last | 1 2 3 4 5 |