Skip to main content
Log in

Standardization in Information Technology Security

  • Published:
Cybernetics and Systems Analysis Aims and scope

Abstract

The author overviews the international standards developed by SC 27 “IT Security techniques” of the ISO/IEC Joint Technical Committee “Information technologies.” The standards include cryptographic mechanisms, evaluation and testing of products and information systems, countermeasures, and security services. Both published standards and those under development are considered.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. M. Fal’, “Standardization in information security management,” Cybern. Syst. Analysis, Vol. 46, No. 3, 512–515 (2010).

    Article  Google Scholar 

  2. ISO/IEC JTC 1/SC 27 Standing Document 11, Overview of the Work of SC27.

  3. Yu. I. Gorbenko, Construction and Analysis of Systems, Protocols, and Methods of Cryptographic Information Protection. Pt. 1, Methods of Construction and Analysis, Standardization and Application of Cryptographic Systems [in Ukrainian], Fort, Kharkiv (2015).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to O. M. Fal’.

Additional information

Translated from Kibernetika i Sistemnyi Analiz, No. 1, January–February, 2017, pp. 91–98.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fal’, O.M. Standardization in Information Technology Security. Cybern Syst Anal 53, 78–82 (2017). https://doi.org/10.1007/s10559-017-9908-8

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10559-017-9908-8

Keywords

Navigation