- 您的位置:
- 中国标准在线服务网 >>
- 全部标准分类 >>
- 国际标准 >>
- 35.030 >>
- ISO/IEC 19896-3:2025 EN 19a63657 Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for evaluators and reviewers according to the ISO/IEC 15408 series and ISO/IEC 18045
【国际标准】 Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for evaluators and reviewers according to the ISO/IEC 15408 series and ISO/IEC 18045
本网站 发布时间:
2025-11-26
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>
适用范围:
暂无
标准号:
ISO/IEC 19896-3:2025 EN
标准名称:
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for evaluators and reviewers according to the ISO/IEC 15408 series and ISO/IEC 18045
英文名称:
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for evaluators and reviewers according to the ISO/IEC 15408 series and ISO/IEC 18045标准状态:
现行-
发布日期:
2025-11-19 -
实施日期:
出版语种:
EN
- 推荐标准
- IEC 62443-3-2:2020 EN d294ffd6 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-3-2:2020 EN-FR 84209ce0 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-4-2:2019 EN-FR 793760b3 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
- ISO/IEC 14888-1:2008 EN 13435099 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
- ISO/IEC 14888-2:2008 EN e21c9d64 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
- ISO/IEC 14888-3:2018 EN a10f4849 IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
- ISO/IEC 14888-4:2024 EN baeb0f4b Information security — Digital signatures with appendix — Part 4: Stateful hash-based mechanisms
- ISO/IEC 15045-3-1:2024 EN 288b801a Information technology — Home Electronic System (HES) gateway — Part 3-1: Privacy, security, and safety — Introduction
- ISO/IEC 15816:2002 EN ade03166 Information technology — Security techniques — Security information objects for access control
- ISO/IEC 15945:2002 EN cc833e91 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
- ISO/IEC 15946-1:2016 EN e8986548 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
- ISO/IEC 15946-5:2017 EN 941deeb5 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
- ISO/IEC 17922:2017 EN ce0d1ad5 Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module
- ISO/IEC 18014-1:2008 EN f75d6cfd Information technology — Security techniques — Time-stamping services — Part 1: Framework
- ISO/IEC 18014-1:2008/Amd 1:2025 EN 79834ac0 Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1
我的标准
购物车
400-168-0010










