"Security techniques" CNS Standards List |
|
CNS 27018
2021 Edition Information technology − Security techniques − Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å…¬ç”¨é›²PII 處ç†è€…ä¿è·å€‹äººå¯è˜åˆ¥è³‡è¨Š(PII)之作æ¥è¦ç¯„ |
![]() |
|
|
CNS 29191
2021 Edition Information technology − Security techniques − Requirements for partially anonymous, partially unlinkable authentication 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éƒ¨åˆ†åŒ¿ååŠéƒ¨åˆ†åŽ»é€£çµé‘‘別之è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27000
2021 Edition Information technology – Security techniques – Information security management systems – Overview and vocabulary 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ç³»çµ±ï¼æ¦‚觀åŠè©žå½™ |
![]() |
|
|
CNS 27016
2021 Edition Information technology − Security techniques − Information security management − Organizational economics 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ï¼çµ„ç¹”ç¶“æ¿Ÿå¸ |
![]() |
|
|
CNS 27002
2021 Edition Information technology − Security techniques − Code of practice for information security controls 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨æŽ§åˆ¶æŽªæ–½ä¹‹ä½œæ¥è¦ç¯„ |
![]() |
|
|
CNS 27701
2020 Edition Security techniques − Extension to CNS 27001 and CNS 27002 for privacy information management − Requirements and guidelines 安全技術ï¼ç”¨æ–¼éš±ç§è³‡è¨Šç®¡ç†ä¹‹CNS 27001åŠCNS 27002延伸ï¼è¦æ±‚äº‹é …åŠæŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 29100-2
2019 Edition Information technology − Security techniques − Requirements for a personal information de-identification process management system 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å€‹äººè³‡è¨ŠåŽ»è˜åˆ¥åŒ–éŽç¨‹ç®¡ç†ç³»çµ±ï¼è¦æ±‚äº‹é … |
![]() |
|
|
CNS 27005
2019 Edition Information technology − Security techniques − Information security risk management 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨é¢¨éšªç®¡ç† |
![]() |
|
|
CNS 29100
2019 Edition Information technology − Security techniques − Privacy framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éš±ç§æ¬Šæ¡†æž¶ |
![]() |
|
|
CNS 29134
2019 Edition Information technology − Security techniques − Guidelines for privacy impact assessment 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éš±ç§è¡æ“Šè©•é‘‘ä¹‹æŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 29151
2019 Edition Information technology − Security techniques − Code of practice for personally identifiable information protection 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å€‹äººå¯è˜åˆ¥è³‡è¨Šä¿è·ä¹‹ä½œæ¥è¦ç¯„ |
![]() |
|
|
CNS 29100-1
2019 Edition Information technology − Security techniques − Specification for a personal information management system 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å€‹è³‡ç®¡ç†ç³»çµ±è¦æ±‚äº‹é … |
![]() |
|
|
CNS 14929-3
2019 Edition Information technology - Guidelines for the management of IT security - Part 3: Techniques for the management of IT security 資訊技術ï¼è³‡è¨ŠæŠ€è¡“安全管ç†æŒ‡å°Žç¶±è¦ï¼ç¬¬3部:資訊技術安全管ç†ä¹‹æŠ€è¡“ |
![]() |
|
|
CNS 15215
2019 Edition Information technology - Security techniques - Information security incident management è³‡è¨ŠæŠ€è¡“â€”å®‰å…¨æŠ€è¡“â€”è³‡è¨Šå®‰å…¨äº‹æ•…ç®¡ç† |
![]() |
|
|
CNS 27032
2019 Edition Information technology − Security techniques − Guidelines for cybersecurity 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ç¶²éš›å®‰å…¨æŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 27003
2019 Edition Information technology − Security techniques − Information security management system implementation guidance 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨ç®¡ç†ç³»çµ±å¯¦ä½œæŒ‡å¼• |
![]() |
|
|
CNS 15216
2019 Edition Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets 資訊技術—安全技術—產出ä¿è·å‰–繪與安全標的之指導 |
![]() |
|
|
CNS 14993
2019 Edition Information technology - Security techniques - Protection profile registration procedures 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ä¿è·å‰–ç¹ªè¨»å†Šç¨‹åº |
![]() |
|
|
CNS 15134-3
2019 Edition Information technology - Security techniques - IT network security - Part 3 : Securing communications between networks using security gateways 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“網路安全ï¼ç¬¬ï¼“部:使用安全閘é“之網路間的安全通訊 |
![]() |
|
|
CNS 14381-3
2019 Edition Information technology - Security techniques - Key management - Part 3 : Mechanism using asymmetric techniques 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼é‡‘鑰管ç†ï¼ç¬¬ï¼“部:使用éžå°ç¨±æŠ€è¡“的機制 |
![]() |
|
|
CNS 15234-1
2019 Edition Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼‘部:一般 |
![]() |
|
|
CNS 14992
2019 Edition Information technology - Security techniques - IT intrusion detection framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“入侵åµæ¸¬æ¡†æž¶ |
![]() |
|
|
CNS 14929-1
2019 Edition Information technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šèˆ‡é€šè¨ŠæŠ€è¡“安全管ç†ï¼ç¬¬1部:資訊與通訊技術安全管ç†æ¦‚念與模型 |
![]() |
|
|
CNS 15653
2019 Edition Information technology − Security techniques − Guidelines for information and communications technology disaster recovery services 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šèˆ‡é€šè¨ŠæŠ€è¡“ç½å®³å¾©åŽŸæœå‹™æŒ‡å¼• |
![]() |
|
|
CNS 15135
2019 Edition Information technology - Security techniques - Security requirements for cryptographic modules 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å¯†ç¢¼æ¨¡çµ„安全è¦æ±‚ |
![]() |
|
|
CNS 15234-4
2019 Edition Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 4: Digital signatures giving message recovery 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼”部:具訊æ¯å¾©åŽŸä¹‹æ•¸ä½ç°½ç« |
![]() |
|
|
CNS 15234-2
2019 Edition Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 2: Digital signatures 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼’部:數ä½ç°½ç« |
![]() |
|
|
CNS 15133
2019 Edition Information technology - Security techniques - Guidelines for the use and management of Trusted Third Party services 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å—信賴第三方æœå‹™çš„使用與管ç†ä¹‹æŒ‡å°Žç¶±è¦ |
![]() |
|
|
CNS 15234-3
2019 Edition Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 3: Key establishment 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼“部:金鑰建立 |
![]() |
|
|
CNS 27010
2019 Edition Information technology − Security techniques − Information security management for inter-sector and inter-organizational communications 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è·¨éƒ¨é–€åŠè·¨çµ„ç¹”é€šè¨Šä¹‹è³‡è¨Šå®‰å…¨ç®¡ç† |
![]() |
Find out:61Items | To Page of: First -Previous-Next -Last | 1 2 3 |