Abstract
The author overviews the international standards developed by SC 27 “IT Security techniques” of the ISO/IEC Joint Technical Committee “Information technologies.” The standards include cryptographic mechanisms, evaluation and testing of products and information systems, countermeasures, and security services. Both published standards and those under development are considered.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
A. M. Fal’, “Standardization in information security management,” Cybern. Syst. Analysis, Vol. 46, No. 3, 512–515 (2010).
ISO/IEC JTC 1/SC 27 Standing Document 11, Overview of the Work of SC27.
Yu. I. Gorbenko, Construction and Analysis of Systems, Protocols, and Methods of Cryptographic Information Protection. Pt. 1, Methods of Construction and Analysis, Standardization and Application of Cryptographic Systems [in Ukrainian], Fort, Kharkiv (2015).
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated from Kibernetika i Sistemnyi Analiz, No. 1, January–February, 2017, pp. 91–98.
Rights and permissions
About this article
Cite this article
Fal’, O.M. Standardization in Information Technology Security. Cybern Syst Anal 53, 78–82 (2017). https://doi.org/10.1007/s10559-017-9908-8
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10559-017-9908-8