Contents 1 Outline 1.1 Outline for ISO/IEC 27002:2013 2 Implementation example of ISO/IEC 27002 2.1 Physical and Environmental security 2.2 Human Resource security 2.3 Access control 3 National Equivalent Standards 4 Certification 5 Ongoing development 6 See also 7 References 8 External links


Outline[edit] Outline for ISO/IEC 27002:2013[edit] The standard starts with 5 introductory chapters: Introduction Scope Normative references Terms and definitions Structure of this standard These are followed by 14 main chapters: Information Security Policies Organization of Information Security Human Resource Security Asset Management Access Control Cryptography Physical and environmental security Operation Security- procedures and responsibilities, Protection from malware, Backup, Logging and monitoring, Control of operational software, Technical vulnerability management and Information systems audit coordination Communication security - Network security management and Information transfer System acquisition, development and maintenance - Security requirements of information systems, Security in development and support processes and Test data Supplier relationships - Information security in supplier relationships and Supplier service delivery management Information security incident management - Management of information security incidents and improvements Information security aspects of business continuity management - Information security continuity and Redundancies Compliance - Compliance with legal and contractual requirements and Information security reviews Within each chapter, information security controls and their objectives are specified and outlined. The information security controls are generally regarded as best practice means of achieving those objectives. For each of the controls, implementation guidance is provided. Specific controls are not mandated since: Each organization is expected to undertake a structured information security risk assessment process to determine its specific requirements before selecting controls that are appropriate to its particular circumstances. The introduction section outlines a risk assessment process although there are more specific standards covering this area such as ISO/IEC 27005. The use of information security risk analysis to drive the selection and implementation of information security controls is an important feature of the ISO/IEC 27000-series standards: it means that the generic good practice advice in this standard gets tailored to the specific context of each user organization, rather than being applied by rote. Not all of the 39 control objectives are necessarily relevant to every organization for instance, hence entire categories of control may not be deemed necessary. The standards are also open ended in the sense that the information security controls are 'suggested', leaving the door open for users to adopt alternative controls if they wish, just so long as the key control objectives relating to the mitigation of information security risks, are satisfied. This helps keep the standard relevant despite the evolving nature of information security threats, vulnerabilities and impacts, and trends in the use of certain information security controls. It is practically impossible to list all conceivable controls in a general purpose standard. Industry-specific implementation guidelines for ISO/IEC 27001:2013 and ISO/IEC 27002 offer advice tailored to organizations in the telecomms industry (see ISO/IEC 27011) and healthcare (see ISO 27799). Most organizations implement a wide range of information security-related controls, many of which are recommended in general terms by ISO/IEC 27002. Structuring the information security controls infrastructure in accordance with ISO/IEC 27002 may be advantageous since it: Is associated with a well-respected international standard Helps avoid coverage gaps and overlaps Is likely to be recognized by those who are familiar with the ISO/IEC standard


Implementation example of ISO/IEC 27002[edit] Here are a few examples of typical information security policies and other controls relating to three parts of ISO/IEC 27002. (Note: this is merely an illustration. The list of example controls is incomplete and not universally applicable.) Physical and Environmental security[edit] Physical access to premises and support infrastructure (communications, power, air conditioning etc.) must be monitored and restricted to prevent, detect and minimize the effects of unauthorized and inappropriate access, tampering, vandalism, criminal damage, theft etc. The list of people authorized to access secure areas must be reviewed and approved periodically (at least once a year) by Administration or Physical Security Department, and cross-checked by their departmental managers. Photography or video recording is forbidden inside Restricted Areas without prior permission from the designated authority. Suitable video surveillance cameras must be located at all entrances and exits to the premises and other strategic points such as Restricted Areas, recorded and stored for at least one month, and monitored around the clock by trained personnel. Access cards permitting time-limited access to general and/or specific areas may be provided to trainees, vendors, consultants, third parties and other personnel who have been identified, authenticated, and authorized to access those areas. Other than in public areas such as the reception foyer, and private areas such as rest rooms, visitors should be escorted at all times by an employee while on the premises. The date and time of entry and departure of visitors along with the purpose of visits must be recorded in a register maintained and controlled by Site Security or Reception. Everyone on site (employees and visitors) must wear and display their valid, issued pass at all times, and must present their pass for inspection on request by a manager, security guard or concerned employee. Access control systems must themselves be adequately secured against unauthorized/inappropriate access and other compromises. Fire/evacuation drills must be conducted periodically (at least once a year). Smoking is forbidden inside the premises other than in designated Smoking Zones. Human Resource security[edit] All employees must be screened prior to employment, including identity verification using a passport or similar photo ID and at least two satisfactory professional references. Additional checks are required for employees taking up trusted positions. All employees must formally accept a binding confidentiality or non-disclosure agreement concerning personal and proprietary information provided to or generated by them in the course of employment. Human Resources department must inform Administration, Finance and Operations when an employee is taken on, transferred, resigns, is suspended or released on long-term leave, or their employment is terminated. Upon receiving notification from HR that an employee's status has changed, Administration must update their physical access rights and IT Security Administration must update their logical access rights accordingly. An employee's manager must ensure that all access cards, keys, IT equipment, storage media and other valuable corporate assets are returned by the employee on or before their last day of employment. Access control[edit] User access to corporate IT systems, networks, applications and information must be controlled in accordance with access requirements specified by the relevant Information Asset Owners, normally according to the user's role. Generic or test IDs must not be created or enabled on production systems unless specifically authorized by the relevant Information Asset Owners. After a predefined number of unsuccessful logon attempts, security log entries and (where appropriate) security alerts must be generated and user accounts must be locked out as required by the relevant Information Asset Owners. Passwords or pass phrases must be lengthy and complex, consisting of a mix of letters, numerals and special characters that would be difficult to guess. Passwords or pass phrases must not be written down or stored in readable format. Authentication information such as passwords, security logs, security configurations and so forth must be adequately secured against unauthorized or inappropriate access, modification, corruption or loss. Privileged access rights typically required to administer, configure, manage, secure and monitor IT systems must be reviewed periodically (at least twice a year) by Information Security and cross-checked by the appropriate departmental managers. Users must either log off or password-lock their sessions before leaving them unattended. Password-protected screensavers with an inactivity timeout of no more than 10 minutes must be enabled on all workstations/PCs. Write access to removable media (USB drives, CD/DVD writers etc.) must be disabled on all desktops unless specifically authorized for legitimate business reasons.


National Equivalent Standards[edit] ISO/IEC 27002 has directly equivalent national standards in several countries. Translation and local publication often results in several months' delay after the main ISO/IEC standard is revised and released, but the national standard bodies go to great lengths to ensure that the translated content accurately and completely reflects ISO/IEC 27002. Countries Equivalent Standard  Australia  New Zealand AS/NZS ISO/IEC 27002:2006  Brazil ISO/IEC NBR 17799/2007 – 27002  Indonesia SNI ISO/IEC 27002:2014  Chile NCH2777 ISO/IEC 17799/2000  China GB/T 22081-2008  Czech Republic ČSN ISO/IEC 27002:2006  Croatia HRN ISO/IEC 27002:2013  Denmark DS/ISO27002:2014 (DK)  Estonia EVS-ISO/IEC 17799:2003, 2005 version in translation  Germany DIN ISO/IEC 27002:2008  Japan JIS Q 27002  Lithuania LST ISO/IEC 27002:2009 (adopted ISO/IEC 27002:2005, ISO/IEC 17799:2005)  Mexico NMX-I-27002-NYCE-2015  Netherlands NEN-ISO/IEC 27002:2013  Peru NTP-ISO/IEC 17799:2007  Poland PN-ISO/IEC 17799:2007, based on ISO/IEC 17799:2005  Russia ГОСТ Р ИСО/МЭК 27002-2012, based on ISO/IEC 27002:2005  Slovakia STN ISO/IEC 27002:2006  South Africa SANS 27002:2014/ISO/IEC 27002:2013[3]  Spain UNE 71501  Sweden SS-ISO/IEC 27002:2014  Turkey TS ISO/IEC 27002  Thailand UNIT/ISO  Ukraine СОУ Н НБУ 65.1 СУІБ 2.0:2010  United Kingdom BS ISO/IEC 27002:2005  Uruguay UNIT/ISO 17799:2005


Certification[edit] ISO/IEC 27002 is an advisory standard that is meant to be interpreted and applied to all types and sizes of organization according to the particular information security risks they face. In practice, this flexibility gives users a lot of latitude to adopt the information security controls that make sense to them, but makes it unsuitable for the relatively straightforward compliance testing implicit in most formal certification schemes. ISO/IEC 27001:2013 (Information technology – Security techniques – Information security management systems – Requirements) is a widely recognized certifiable standard. ISO/IEC 27001 specifies a number of firm requirements for establishing, implementing, maintaining and improving an ISMS, and in Annex A there is a suite of information security controls that organizations are encouraged to adopt where appropriate within their ISMS. The controls in Annex A are derived from and aligned with ISO/IEC 27002.


Ongoing development[edit] Both ISO/IEC 27001:2013 and ISO/IEC 27002 are revised by ISO/IEC JTC1/SC27 every few years in order to keep them current and relevant. Revision involves, for instance, incorporating references to other issued security standards (such as ISO/IEC 27000, ISO/IEC 27004 and ISO/IEC 27005) and various good security practices that have emerged in the field since they were last published. Due to the significant 'installed base' of organizations already using ISO/IEC 27002, particularly in relation to the information security controls supporting an ISMS that complies with ISO/IEC 27001, any changes have to be justified and, wherever possible, evolutionary rather than revolutionary in nature.


See also[edit] BS 7799, the original British Standard from which ISO/IEC 17799 and then ISO/IEC 27002 was derived ISO/IEC 27000-series IT baseline protection IT risk management List of ISO standards Sarbanes–Oxley Act Standard of Good Practice published by the Information Security Forum ISO/IEC JTC 1/SC 27 – IT Security techniques NIST Cybersecurity Framework Cyber Risk Quantification


References[edit] ^ "ISO27k timeline". ISO27001security.com. IsecT Ltd. Retrieved 9 March 2016.  ^ "ISC CISSP Official Study Guide". SYBEX. ISBN 978-1119042716. Retrieved 1 November 2016.  ^ "SANS 27002:2014 (Ed. 2.00)". SABS Web Store. Retrieved 25 May 2015. 


External links[edit] The ISO 17799 Newsletter ISO/IEC 27002:2013 v t e ISO standards by standard number List of ISO standards / ISO romanizations / IEC standards 1–9999 1 2 3 4 5 6 7 9 16 31 -0 -1 -2 -3 -4 -5 -6 -7 -8 -9 -10 -11 -12 -13 128 216 217 226 228 233 259 269 302 306 428 518 519 639 -1 -2 -3 -5 -6 646 690 732 764 843 898 965 1000 1004 1007 1073-1 1413 1538 1745 1989 2014 2015 2022 2047 2108 2145 2146 2240 2281 2709 2711 2788 2848 2852 3029 3103 3166 -1 -2 -3 3297 3307 3602 3864 3901 3977 4031 4157 4217 4909 5218 5428 5775 5776 5800 5964 6166 6344 6346 6385 6425 6429 6438 6523 6709 7001 7002 7098 7185 7200 7498 7736 7810 7811 7812 7813 7816 8000 8178 8217 8571 8583 8601 8632 8652 8691 8807 8820-5 8859 -1 -2 -3 -4 -5 -6 -7 -8 -8-I -9 -10 -11 -12 -13 -14 -15 -16 8879 9000/9001 9075 9126 9293 9241 9362 9407 9506 9529 9564 9594 9660 9897 9899 9945 9984 9985 9995 10000–19999 10005 10006 10007 10116 10118-3 10160 10161 10165 10179 10206 10218 10303 -11 -21 -22 -28 -238 10383 10487 10585 10589 10646 10664 10746 10861 10957 10962 10967 11073 11170 11179 11404 11544 11783 11784 11785 11801 11898 11940 (-2) 11941 11941 (TR) 11992 12006 12182 12207 12234-2 13211 -1 -2 13216 13250 13399 13406-2 13450 13485 13490 13567 13568 13584 13616 14000 14031 14224 14289 14396 14443 14496 -2 -3 -6 -10 -11 -12 -14 -17 -20 14644 14649 14651 14698 14750 14764 14882 14971 15022 15189 15288 15291 15292 15398 15408 15444 -3 15445 15438 15504 15511 15686 15693 15706 -2 15707 15897 15919 15924 15926 15926 WIP 15930 16023 16262 16612-2 16750 16949 (TS) 17024 17025 17100 17203 17369 17442 17799 18000 18004 18014 18245 18629 18916 19005 19011 19092 (-1 -2) 19114 19115 19125 19136 19439 19500 19501 19502 19503 19505 19506 19507 19508 19509 19510 19600:2014 19752 19757 19770 19775-1 19794-5 19831 20000+ 20000 20022 20121 20400 21000 21047 21500 21827:2002 22000 23270 23271 23360 24517 24613 24617 24707 25178 25964 26000 26300 26324 27000 series 27000 27001 27002 27006 27729 28000 29110 29148 29199-2 29500 30170 31000 32000 38500 40500 42010 55000 80000 -1 -2 -3 Category v t e Information security certifications CompTIA Security+ CSA+ CASP Cisco Systems CCNA Security CCNP Security CCIE Security EC-Council CEH CNDA EITCI EITCA/IS ISACA CISA CISM CRISC (ISC)² CISSP SSCP ISSMP ISSEP ISSAP Mile2 CPTE Offensive Security OSCP OSWP OSCE OSEE OSWE eLearnSecurity eCPPT GIAC GISF GSEC GCIA GCIH GCUX GCWN GCED GPEN GWAPT GAWN GICSP G7799 GSNA GISP GSLC GCPM GSSP-JAVA GSSP-.NET GWEB GCFE GCFA GREM GNFA GLEG GSE v t e List of International Electrotechnical Commission standards IEC standards IEC 60027 IEC 60034 IEC 60038 IEC 60062 IEC 60063 IEC 60068 IEC 60112 IEC 60228 IEC 60269 IEC 60297 IEC 60309 IEC 60320 IEC 60364 IEC 60446 IEC 60559 IEC 60601 IEC 60870 IEC 60870-5 IEC 60870-6 IEC 60906-1 IEC 60908 IEC 60929 IEC 60958 AES3 S/PDIF IEC 61030 IEC 61131 IEC 61131-3 IEC 61158 IEC 61162 IEC 61334 IEC 61346 IEC 61355 IEC 61400 IEC 61499 IEC 61508 IEC 61511 IEC 61850 IEC 61851 IEC 61883 IEC 61960 IEC 61968 IEC 61970 IEC 62014-4 IEC 62056 IEC 62061 IEC 62196 IEC 62262 IEC 62264 IEC 62304 IEC 62325 IEC 62351 IEC 62365 IEC 62366 IEC 62379 IEC 62386 IEC 62455 IEC 62680 IEC 62682 IEC 62700 ISO/IEC standards ISO/IEC 646 ISO/IEC 2022 ISO/IEC 4909 ISO/IEC 5218 ISO/IEC 6429 ISO/IEC 6523 ISO/IEC 7810 ISO/IEC 7811 ISO/IEC 7812 ISO/IEC 7813 ISO/IEC 7816 ISO/IEC 7942 ISO/IEC 8613 ISO/IEC 8632 ISO/IEC 8652 ISO/IEC 8859 ISO/IEC 9126 ISO/IEC 9293 ISO/IEC 9592 ISO/IEC 9593 ISO/IEC 9899 ISO/IEC 9945 ISO/IEC 9995 ISO/IEC 10021 ISO/IEC 10116 ISO/IEC 10165 ISO/IEC 10179 ISO/IEC 10646 ISO/IEC 10967 ISO/IEC 11172 ISO/IEC 11179 ISO/IEC 11404 ISO/IEC 11544 ISO/IEC 11801 ISO/IEC 12207 ISO/IEC 13250 ISO/IEC 13346 ISO/IEC 13522-5 ISO/IEC 13568 ISO/IEC 13818 ISO/IEC 14443 ISO/IEC 14496 ISO/IEC 14882 ISO/IEC 15288 ISO/IEC 15291 ISO/IEC 15408 ISO/IEC 15444 ISO/IEC 15445 ISO/IEC 15504 ISO/IEC 15511 ISO/IEC 15693 ISO/IEC 15897 ISO/IEC 15938 ISO/IEC 16262 ISO/IEC 17024 ISO/IEC 17025 ISO/IEC 18000 ISO/IEC 18004 ISO/IEC 18014 ISO/IEC 19752 ISO/IEC 19757 ISO/IEC 19770 ISO/IEC 19788 ISO/IEC 20000 ISO/IEC 21000 ISO/IEC 21827 ISO/IEC 23000 ISO/IEC 23003 ISO/IEC 23008 ISO/IEC 23270 ISO/IEC 23360 ISO/IEC 24707 ISO/IEC 24727 ISO/IEC 24744 ISO/IEC 24752 ISO/IEC 26300 ISO/IEC 27000 ISO/IEC 27000-series ISO/IEC 27002 ISO/IEC 27040 ISO/IEC 29119 ISO/IEC 33001 ISO/IEC 38500 ISO/IEC 42010 ISO/IEC 80000 Related International Electrotechnical Commission Retrieved from "https://en.wikipedia.org/w/index.php?title=ISO/IEC_27002&oldid=824451815" Categories: Computer security standardsInformation assurance standardsISO/IEC 27000-seriesHidden categories: Use British English Oxford spelling from January 2012Articles needing additional references from January 2013All articles needing additional references


Navigation menu Personal tools Not logged inTalkContributionsCreate accountLog in Namespaces ArticleTalk Variants Views ReadEditView history More Search Navigation Main pageContentsFeatured contentCurrent eventsRandom articleDonate to WikipediaWikipedia store Interaction HelpAbout WikipediaCommunity portalRecent changesContact page Tools What links hereRelated changesUpload fileSpecial pagesPermanent linkPage informationWikidata itemCite this page Print/export Create a bookDownload as PDFPrintable version Languages CatalàDeutschEspañolفارسیFrançaisBahasa IndonesiaItaliano日本語PolskiРусскийYorùbá中文 Edit links This page was last edited on 7 February 2018, at 12:31. Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization. Privacy policy About Wikipedia Disclaimers Contact Wikipedia Developers Cookie statement Mobile view (window.RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgPageParseReport":{"limitreport":{"cputime":"0.236","walltime":"0.351","ppvisitednodes":{"value":2509,"limit":1000000},"ppgeneratednodes":{"value":0,"limit":1500000},"postexpandincludesize":{"value":90653,"limit":2097152},"templateargumentsize":{"value":3001,"limit":2097152},"expansiondepth":{"value":12,"limit":40},"expensivefunctioncount":{"value":2,"limit":500},"entityaccesscount":{"value":0,"limit":400},"timingprofile":["100.00% 219.083 1 -total"," 28.90% 63.321 27 Template:Flag"," 23.32% 51.093 1 Template:Reflist"," 18.18% 39.837 3 Template:Cite_web"," 15.39% 33.719 1 Template:Refimprove"," 14.80% 32.416 3 Template:Navbox"," 13.84% 30.323 1 Template:Ambox"," 12.13% 26.573 1 Template:Use_British_(Oxford)_English"," 12.09% 26.482 1 Template:ISO_standards"," 4.94% 10.816 1 Template:DMCA"]},"scribunto":{"limitreport-timeusage":{"value":"0.057","limit":"10.000"},"limitreport-memusage":{"value":2980350,"limit":52428800}},"cachereport":{"origin":"mw1239","timestamp":"20180217152242","ttl":1900800,"transientcontent":false}}});});(window.RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgBackendResponseTime":447,"wgHostname":"mw1239"});});


ISO/IEC_27002 - Photos and All Basic Informations

ISO/IEC_27002 More Links

Information SecurityInternational StandardInternational Organization For StandardizationInternational Electrotechnical CommissionWikipedia:VerifiabilityHelp:Introduction To Referencing With Wiki Markup/1Help:Maintenance Template RemovalISO/IEC 27000-seriesRoyal Dutch ShellISO/IEC 27000-seriesBest PracticeInformation Security Management SystemCIA TriadConfidentialityIntegrityAvailabilitySecurity ControlsISO/IEC 27005ISO/IEC 27000-seriesISO/IEC 27001:2013ISO 27799AustraliaNew ZealandBrazilIndonesiaChileChinaCzech RepublicCroatiaDenmarkEstoniaGermanyJapanLithuaniaMexicoNetherlandsPeruPolandRussiaSlovakiaSouth AfricaSpainSwedenTurkeyThailandUkraineUnited KingdomUruguayISO/IEC 27001:2013ISO/IEC 27001:2013ISO/IEC JTC 1/SC 27ISO/IEC 27000ISO/IEC 27004ISO/IEC 27005ISO/IEC 27001BS 7799ISO/IEC 27000-seriesIT Baseline ProtectionIT Risk ManagementList Of ISO StandardsSarbanes–Oxley ActStandard Of Good PracticeInformation Security ForumISO/IEC JTC 1/SC 27NIST Cybersecurity FrameworkCyber Risk QuantificationInternational Standard Book NumberSpecial:BookSources/978-1119042716Template:ISO StandardsTemplate Talk:ISO StandardsInternational Organization For StandardizationList Of International Organization For Standardization StandardsList Of ISO RomanizationsList Of IEC StandardsISO 1ISO 2Preferred NumberISO 4ISO 5ISO 6ISO 7ISO 9A440 (pitch Standard)ISO 31ISO 31-0ISO 31-1ISO 31-2ISO 31-3ISO 31-4ISO 31-5ISO 31-6ISO 31-7ISO 31-8ISO 31-9ISO 31-10ISO 31-11ISO 31-12ISO 31-13ISO 128ISO 216ISO 217ISO 226British Standard Pipe ThreadISO 233ISO 259EnvelopeKappa NumberVicat Softening PointISO 428ISO 518ISO 519ISO 639ISO 639-1ISO 639-2ISO 639-3ISO 639-5ISO 639-6ISO/IEC 646ISO 690ISO 732Antimagnetic WatchISO 843ISO 898ISO 965ISO 1000Magnetic Ink Character Recognition135 FilmOCR-A FontISO 1413ALGOL 60ISO 1745ISO 1989ISO 2014ISO 2015ISO/IEC 2022ISO 2047International Standard Book NumberISO 2145ISO 2146ISO 2240Water Resistant MarkISO 2709ISO 2711ISO 2788ISO 2848ISO 2852126 FilmISO 3103ISO 3166ISO 3166-1ISO 3166-2ISO 3166-3International Standard Serial NumberISO 3307Kunrei-shiki RomanizationISO 3864International Standard Recording CodeISO 3977ISO 4031ISO 4157ISO 4217ISO/IEC 4909ISO/IEC 5218ISO 5428ISO 5775ISO 5776ISO 5800ISO 5964ISO 6166ISO 6344ISO 6346ISO 6385Water Resistant MarkANSI Escape CodeISO 6438ISO 6523ISO 6709ISO 7001ISO 7002PinyinPascal (programming Language)ISO 7200OSI ModelISO 7736ISO/IEC 7810ISO/IEC 7811ISO/IEC 7812ISO/IEC 7813ISO/IEC 7816ISO 8000ISO 8178Fuel OilFTAMISO 8583ISO 8601Computer Graphics MetafileISO/IEC 8652ISO 8691Language Of Temporal Ordering SpecificationISO/IEC 8820-5ISO/IEC 8859ISO/IEC 8859-1ISO/IEC 8859-2ISO/IEC 8859-3ISO/IEC 8859-4ISO/IEC 8859-5ISO/IEC 8859-6ISO/IEC 8859-7ISO/IEC 8859-8ISO-8859-8-IISO/IEC 8859-9ISO/IEC 8859-10ISO/IEC 8859-11ISO/IEC 8859-12ISO/IEC 8859-13ISO/IEC 8859-14ISO/IEC 8859-15ISO/IEC 8859-16Standard Generalized Markup LanguageISO 9000SQLISO/IEC 9126File Allocation TableISO 9241ISO 9362Shoe SizeManufacturing Message SpecificationISO 9529ISO 9564X.500ISO 9660ISO 9897C (programming Language)POSIXISO 9984ISO 9985ISO/IEC 9995ISO 10005ISO 10006ISO 10007ISO/IEC 10116Whirlpool (cryptography)ISO 10160ISO 10161Guidelines For The Definition Of Managed ObjectsDocument Style Semantics And Specification LanguageISO 10206ISO 10218ISO 10303EXPRESS (data Modeling Language)ISO 10303-21ISO 10303-22ISO 10303-28STEP-NCISO 10383ISO 10487ArmSCIIIS-ISUniversal Coded Character SetTorxRM-ODPMultibusInternational Standard Music NumberISO 10962ISO/IEC 10967ISO/IEEE 11073ISO 11170ISO/IEC 11179ISO/IEC 11404JBIGISO 11783ISO 11784 & 11785ISO 11784 & 11785ISO/IEC 11801ISO 11898ISO 11940ISO 11940-2ISO/TR 11941ISO/TR 11941ISO 11992ISO 12006ISO/IEC TR 12182ISO/IEC 12207Tag Image File Format / Electronic PhotographyPrologPrologPrologIsofixTopic MapsISO 13399ISO 13406-2110 FilmISO 13485ISO 13490ISO 13567Z NotationISO 13584International Bank Account NumberISO 14000ISO 14031ISO 14224PDF/UAHorsepowerISO/IEC 14443MPEG-4MPEG-4 Part 2MPEG-4 Part 3Delivery Multimedia Integration FrameworkH.264/MPEG-4 AVCMPEG-4 Part 11MPEG-4 Part 12MPEG-4 Part 14MPEG-4 Part 14MPEG-4 Part 14ISO 14644STEP-NCISO 14651ISO 14698ISO 14750Software MaintenanceC++ISO 14971ISO 15022ISO 15189ISO/IEC 15288Ada Semantic Interface SpecificationISO 15292ISO 15398Common CriteriaJPEG 2000Motion JPEG 2000HTMLPDF417ISO/IEC 15504International Standard Identifier For Libraries And Related OrganizationsISO 15686ISO/IEC 15693International Standard Audiovisual NumberISO 15706-2International Standard Musical Work CodeISO 15897ISO 15919ISO 15924ISO 15926ISO 15926 WIPPDF/XMaxiCodeECMAScriptPDF/VTISO 16750ISO/TS 16949ISO/IEC 17024ISO/IEC 17025ISO 17100:2015Open Virtualization FormatSDMXLegal Entity IdentifierISO/IEC 18000QR CodeISO/IEC 18014ISO 18245Process Specification LanguagePhotographic Activity TestPDF/AISO 19011ISO 19092-1ISO 19092-2ISO 19114ISO 19115Simple Feature AccessISO 19136ISO 19439Common Object Request Broker ArchitectureUnified Modeling LanguageMeta-Object FacilityXML Metadata InterchangeUnified Modeling LanguageKnowledge Discovery MetamodelObject Constraint LanguageMeta-Object FacilityXML Metadata InterchangeBusiness Process Model And NotationISO 19600:2014ISO/IEC 19752RELAX NGISO/IEC 19770X3DISO/IEC 19794-5Cloud Infrastructure Management InterfaceISO/IEC 20000ISO 20022ISO 20121ISO 20400MPEG-21International Standard Text CodeISO 21500ISO/IEC 21827ISO 22000C Sharp (programming Language)Common Language InfrastructureLinux Standard BasePDF/ELexical Markup FrameworkISO-TimeMLCommon LogicISO 25178ISO 25964ISO 26000OpenDocumentDigital Object IdentifierISO/IEC 27000-seriesISO/IEC 27000ISO/IEC 27001ISO/IEC 27006International Standard Name IdentifierISO 28000ISO 29110Requirements EngineeringJPEG XROffice Open XMLRuby (programming Language)ISO 31000Portable Document FormatISO/IEC 38500Web Content Accessibility GuidelinesISO/IEC 42010ISO 55000ISO/IEC 80000ISO 80000-1ISO 80000-2ISO 80000-3Category:ISO StandardsTemplate:Information Security CertificationsTemplate Talk:Information Security CertificationsList Of Computer Security CertificationsCompTIACisco SystemsCisco CertificationsCisco CertificationsCisco CertificationsEC-CouncilCertified Ethical HackerCertified Network Defense ArchitectEuropean Information Technologies Certification InstituteEuropean Information Technologies Certification AcademyISACACertified Information Systems AuditorCertified Information Security ManagerCertified In Risk And Information Systems Control(ISC)²Certified Information Systems Security ProfessionalSystems Security Certified PractitionerInformation Systems Security Management ProfessionalInformation Systems Security Engineering ProfessionalInformation Systems Security Architecture ProfessionalMile2CPTE Certified Penetration Testing EngineerOffensive Security Certified ProfessionalELearnSecurityELearnSecurity Certified Professional Penetration TesterGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationGlobal Information Assurance CertificationTemplate:List Of International Electrotechnical Commission StandardsTemplate Talk:List Of International Electrotechnical Commission StandardsList Of International Electrotechnical Commission StandardsIEC 60027IEC 60034IEC 60038Letter And Digit CodeE-series Of Preferred NumbersIEC 60068Comparative Tracking IndexIEC 60228IEC 6026919-inch RackIEC 60309IEC 60320IEC 60364IEC 60446IEEE 754IEC 60601IEC 60870IEC 60870-5IEC 60870-6IEC 60906-1Compact Disc Digital AudioIEC 60929IEC 60958AES3S/PDIFIEC 61030IEC 61131IEC 61131-3FieldbusIEC 61162IEC 61334IEC 61346IEC 61355IEC 61400IEC 61499IEC 61508IEC 61511IEC 61850IEC 61851IEC 61883IEC 61960IEC 61968IEC 61970IP-XACTIEC 62056IEC 62061IEC 62196EN 62262IEC 62264IEC 62304IEC 62325IEC 62351AES47IEC 62366IEC 62379Digital Addressable Lighting InterfaceIEC 62455USBIEC 62682IEC 62700ISO/IEC 646ISO/IEC 2022ISO/IEC 4909ISO/IEC 5218ANSI Escape CodeISO/IEC 6523ISO/IEC 7810ISO/IEC 7811ISO/IEC 7812ISO/IEC 7813ISO/IEC 7816Graphical Kernel SystemOpen Document ArchitectureComputer Graphics MetafileISO/IEC 8652ISO/IEC 8859ISO/IEC 9126File Allocation TablePHIGSPHIGSANSI CPOSIXISO/IEC 9995ISO/IEC 10021ISO/IEC 10116Guidelines For The Definition Of Managed ObjectsDocument Style Semantics And Specification LanguageUniversal Coded Character SetISO/IEC 10967MPEG-1ISO/IEC 11179ISO/IEC 11404JBIGISO/IEC 11801ISO/IEC 12207Topic MapsUniversal Disk FormatMHEG-5Z NotationMPEG-2ISO/IEC 14443MPEG-4C++ISO/IEC 15288Ada Semantic Interface SpecificationCommon CriteriaJPEG 2000HTMLISO/IEC 15504International Standard Identifier For Libraries And Related OrganizationsISO/IEC 15693ISO/IEC 15897MPEG-7ECMAScriptISO/IEC 17024ISO/IEC 17025ISO/IEC 18000QR CodeISO/IEC 18014ISO/IEC 19752RELAX NGISO/IEC 19770ISO/IEC 19788ISO/IEC 20000MPEG-21ISO/IEC 21827MPEG-AMPEG-DMPEG-HC Sharp (programming Language)Linux Standard BaseCommon LogicISO/IEC 24727ISO/IEC 24744Universal Remote ConsoleOpenDocumentISO/IEC 27000ISO/IEC 27000-seriesISO/IEC 27040ISO/IEC 29119ISO/IEC 33001ISO/IEC 38500ISO/IEC 42010ISO/IEC 80000International Electrotechnical CommissionHelp:CategoryCategory:Computer Security StandardsCategory:Information Assurance StandardsCategory:ISO/IEC 27000-seriesCategory:Use British English Oxford Spelling From January 2012Category:Articles Needing Additional References From January 2013Category:All Articles Needing Additional ReferencesDiscussion About Edits From This IP Address [n]A List Of Edits Made From This IP Address [y]View The Content Page [c]Discussion About The Content Page [t]Edit This Page [e]Visit The Main Page [z]Guides To Browsing WikipediaFeatured Content – The Best Of WikipediaFind Background Information On Current EventsLoad A Random Article [x]Guidance On How To Use And Edit WikipediaFind Out About WikipediaAbout The Project, What You Can Do, Where To Find ThingsA List Of Recent Changes In The Wiki [r]List Of All English Wikipedia Pages Containing Links To This Page [j]Recent Changes In Pages Linked From This Page [k]Upload Files [u]A List Of All Special Pages [q]Wikipedia:AboutWikipedia:General Disclaimer



view link view link view link view link view link