Estándares de Seguridad

Panorama

Imagen tomada de:
InfoSec México

Los estándares han sido uno de los principales factores que han permitido interactuar a los miles o millones de componentes informáticos y las distintas herramientas que existen, para proporcionar a su vez una experiencia satisfactoria al usuario. Han sido la herramienta base de la interoperabilidad informática.

La implementación de Estándares de Seguridad de la Información responden a diversas necesidades, según la institución donde se aplica. La ISO ha reservado la serie ISO/IEC 27000 para una gama de normas de gestión de la seguridad de la información.

Publicaciones

    Español

    1. Dedicated Hash-Function 8 (SHA-224)
    2. Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
    3. Information technology - Biometric information protection
    4. Information technology - Security techniques - A framework for IT security assurance - Part 1: Overview and framework
    5. Information technology - Security techniques - A framework for IT security assurance - Part 2: Assurance methods
    6. Information technology - Security techniques - A framework for IT security assurance - Part 3: Analysis of assurance methods
    7. Information technology - Security techniques - Authenticated encryption
    8. Information technology - Security techniques - Check character systems
    9. Information technology - Security techniques - Code of practice for information security management
    10. Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
    11. Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
    12. Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms
    13. Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms
    14. Information technology - Security techniques - Digital signatures with appendix - Part 1: General
    15. Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
    16. Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
    17. Information technology - Security techniques - Encryption algorithms - Part 1: General
    18. Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers
    19. Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers
    20. Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers
    21. Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
    22. Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
    23. Information technology - Security techniques - Entity authentication - Part 1: General
    24. Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
    25. Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
    26. Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
    27. Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
    28. Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
    29. Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
    30. Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
    31. Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components
    32. Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components
    33. Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
    34. Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
    35. Information technology - Security techniques - Guidelines for the use and management of Trusted Third Party services
    36. Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
    37. Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
    38. Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions
    39. Information technology - Security techniques - Information security incident management
    40. Information technology - Security techniques - Information security management system implementation guidance
    41. Information technology - Security techniques - Information security management systems - Overview and vocabulary
    42. Information technology - Security techniques - Information security management systems - Requirements
    43. Information technology - Security techniques - Information security risk management
    44. Information technology - Security techniques - IT network security - Part 2: Network security architecture
    45. Information technology - Security techniques - IT network security - Part 3: Securing communications between networks using security gateways
    46. Information technology - Security techniques - IT network security - Part 4: Securing remote access
    47. Information technology - Security techniques - IT network security - Part 5: Securing communications across networks using virtual private networks
    48. Information technology - Security techniques - Key management - Part 1: Framework
    49. Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
    50. Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
    51. Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
    52. Information technology - Security techniques - Key management - Part 5: Group key management
    53. Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher
    54. Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
    55. Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
    56. Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
    57. Information technology - Security techniques - Methodology for IT security evaluation
    58. Information technology - Security techniques - Modes of operation for an n-bit block cipher
    59. Information technology - Security techniques - Non-repudiation - Part 1: General
    60. Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques
    61. Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques
    62. Information technology - Security techniques - Prime number generation
    63. Information technology - Security techniques - Protection Profile registration procedures
    64. Information technology - Security techniques - Random bit generation
    65. Information technology - Security techniques - Secure software development and evaluation under ISO/IEC 15408 and ISO/IEC 18405
    66. Information technology - Security techniques - Security assessment of operational systems
    67. Information technology - Security techniques - Security evaluation of biometrics
    68. Information technology - Security techniques - Security information objects for access control
    69. Information technology - Security techniques - Security requirements for cryptographic modules
    70. Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems
    71. Information technology - Security techniques - Specification of TTP services to support the application of digital signatures
    72. Information technology - Security techniques - Test requirements for cryptographic modules
    73. Information technology - Security techniques - Time-stamping services - Part 1: Framework
    74. Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens
    75. Information technology - Security techniques - Time-stamping services - Part 3: Mechanisms producing linked tokens
    76. Information technology - Trusted Platform Module - Part 1: Overview
    77. Information technology - Trusted Platform Module - Part 2: Design principles
    78. Information technology - Trusted Platform Module - Part 3: Structures
    79. Information technology - Trusted Platform Module - Part 4: Commands
    80. Mas Inf
    81. nformation technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms
    82. nformation technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher