ZH

RU

ES

Beacon Global Technology

Beacon Global Technology, Total:500 items.

In the international standard classification, Beacon Global Technology involves: Applications of information technology, Telecommunication systems, Character sets and information coding, Information technology (IT) in general, Company organization and management, Astronomy. Geodesy. Geography, Telecontrol. Telemetering, Radiocommunications, Vocabularies, Farming and forestry, Accident and disaster control, Geology. Meteorology. Hydrology, Finances. Banking. Monetary systems. Insurance, Manufacturing forming processes.


Canadian Standards Association (CSA), Beacon Global Technology

  • CAN/CSA-ISO/CEI 10021-2:2004 Technologies de l'information - Systèmes de messagerie (MHS): Architecture globale
  • CSA ISO/IEC 18036-04:2004 Information technology Icon symbols and functions for World Wide Web browser toolbars ISO/IEC 18036:2003
  • CAN/CSA-ISO/IEC 18045:2009 Information technology - Security techniques - Methodology for IT security evaluation
  • CAN/CSA-ISO/IEC 27035:2013 Information technology - Security techniques - Information security Incident management
  • CAN/CSA-ISO/IEC 27005:2011 Information technology - Security techniques - Information security risk management
  • CAN/CSA-ISO/IEC 27004:2010 Information technology - Security techniques - Information security management - Measurement
  • CSA ISO/IEC 27005-09-CAN/CSA:2009 Information technology ?Security techniques ?Information security risk management
  • CAN/CSA-ISO/CEI 27001:2014 Technologies de l’information - Techniques de sécurité - Systèmes de management de la sécurité de l’information - Exigences
  • CAN/CSA-ISO/IEC 15408-2:2009 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components
  • CAN/CSA-ISO/IEC 13335-1:2005 Information technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management
  • CAN/CSA-ISO/CEI 27002:2008 Technologies de l'information - Techniques de sécurité - Code de bonne pratique pour la gestion de la sécurité de l'information
  • CAN/CSA-ISO/IEC 27001:2014 Information technology - Security techniques - Information security management systems - Requirements
  • CAN/CSA-ISO/IEC 27002:2008 Information technology - Security techniques - Code of practice for information security management
  • CAN/CSA-ISO/CEI 15816:2004 Technologies de l'information - Techniques de sécurité - Objets d'information de sécurité pour le contr?le d'accès
  • CAN/CSA-ISO/IEC TR 27008:2013 Information technology - Security techniques - Guidelines for auditors on information security controls
  • CSA ISO/IEC 27002-08-CAN/CSA:2008 Information technology ?Security techniques ?Code of practice for information security management
  • CSA ISO/CEI 15816-04-CAN/CSA:2004 Technologies de l'information ?Techniques de s閏urit??Objets d'information de s閏urit?pour le contr鬺e d'acc鑣
  • CAN/CSA-ISO/IEC 15816:2004 Information technology - Security techniques - Security information objects for access control
  • CAN/CSA-ISO/IEC TR 15446:2010 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
  • CSA ISO/IEC 15408-2-09-CAN/CSA:2009 Information technology ?Security techniques ?Evaluation criteria for IT security ?Part 2: Security functional components
  • CSA ISO/IEC 15408-3-09-CAN/CSA:2009 Information technology ?Security techniques ?Evaluation criteria for IT security ?Part 3: Security assurance components
  • CAN/CSA-ISO/IEC 15408-3:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
  • CSA ISO/IEC-13335-1-05:2005 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management ISO/IEC 13335-1: 2004 [Replaced: CSA ISO/IEC TR 1
  • CAN/CSA-ISO/IEC 27007:2013 Information technology - Security techniques - Guidelines for information security management systems auditing
  • CAN/CSA-ISO/IEC 27003:2010 Information technology - Security techniques - Information security management system implementation guidance
  • CSA ISO/IEC TR 15446-05:2005 Information technology Security techniques Guide for the production of Protection Profiles and Security Targets ISO/IEC TR 15446:2004
  • CSA ISO/IEC 18045-09-CAN/CSA:2009 Information technology ?Security techniques ?Methodology for IT security evaluation
  • CAN/CSA-ISO/IEC 27010:2013 Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
  • CAN/CSA-ISO/IEC 27000:2014 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • CSA ISO/IEC TR 18044-05:2005 Information technology Security techniques information security incident management ISO/IEC TR 18044:2004
  • CAN/CSA-ISO/CEI 27000:2014 Technologies de l’information — Techniques de sécurité — Systèmes de management de la sécurité de l’information — Vue d’ensemble et vocabulaire
  • CAN/CSA-ISO/IEC 24762:2008 Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
  • CAN/CSA-ISO/IEC 18032:2006 Information technology - Security techniques - Prime number generation

Professional Standard - Post and Telecommunication, Beacon Global Technology

  • YDN 110-1999 Technical requirement for global satellite mobile communication system (internal standard)

International Telecommunication Union (ITU), Beacon Global Technology

  • ITU-T Y.101-2000 Global Informatioon Infrastructure Technology - Terms and Definition Series Y: Global Information and Infrastructure and Internet Protocol Aspects Global Information Infrastructure - General
  • ITU-T Y.101 SPANISH-2000 Global Information Infrastructure terminology: Terms and definitions
  • ITU-T X.1054-2012 (Pre-Published) Information technology - Security techniques - Governance of information security
  • ITU-T X.841-2000 Information Technology - Security Techniques - Security Information Objects for Access Control Series X: Data Networks and Open System Communications Security Study Group 7
  • ITU-T Y.100 SPANISH-1998 General overview of the Global Information Infrastructure standards development
  • ITU-T Y.1001-2000 IP Framework - A Framework for Convergence of Telecommunications Network and IP Network Technologies Series Y: Global Information Infrastructure and Internet Protocol Aspects Internet Protocol Aspects - General
  • ITU-T STIT RUSSIAN-2003 Security in Telecommunications and Information Technology
  • ITU-T Y.100-1998 General Overview of the Global Information Infrastructure Standards Development - Series Y: Global Information Infrastructure - General Study Group 13; 19 pp

Standard Association of Australia (SAA), Beacon Global Technology

  • AS ISO/IEC 15408.2:2004 Information technology - Security techniques - Evaluation criteria for IT security - Security functional requirements
  • AS ISO/IEC 15408.3:2004 Information technology - Security techniques - Evaluation criteria for IT security - Security assurance requirements
  • AS/NZS ISO/IEC 18044:2006 Information technology - Security techniques - Information security incident management
  • AS/NZS ISO/IEC 17799:2001 Information technology - Code of practice for information security management
  • AS/NZS ISO/IEC 17799:2006 Information technology - Security techniques - Code of practice for information security management
  • AS ISO/IEC 27001:2015 Information technology — Security techniques — Information security management systems — Requirements
  • AS ISO/IEC 27003:2017 Information technology — Security techniques — Information security management systems — Guidance
  • AS ISO/IEC 15408.1:2004 Information technology - Security techniques - Evaluation criteria for IT security - Introduction and general model
  • AS ISO/IEC 9798.5:2006 Information technology - Security techniques - Entity authentication - Mechanisms using zero-knowledge techniques
  • AS/NZS ISO/IEC 27005:2012 Information technology — Security techniques -Information security risk management (ISO/IEC 27005:2011, MOD)

中华人民共和国国家质量监督检验检疫总局、中国国家标准化管理委员会, Beacon Global Technology

  • GB/T 35287-2017 Information security technology—Guidelines of trusted identity technology for website
  • GB/T 33560-2017 Information security technology—Cryptographic application identifier criterion specification
  • GB/T 29246-2017 Information technology—Security techniques—Information security management systems—Overview and vocabulary

Korean Agency for Technology and Standards (KATS), Beacon Global Technology

  • KS X ISO/IEC 15408-2-2014(2019) Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
  • KS X ISO/IEC 18045-2010(2017) Information technology-Security techniques-Methodology for IT security evaluation
  • KS X ISO/IEC TR 15446:2021 Information technology — Security techniques — Guidance for the production of protection profiles and security targets
  • KS X ISO/IEC 27001:2014 Information technology — Security techniques — Information security management systems — Requirements
  • KS X ISO/IEC 27005:2014 Information technology — Security techniques — Information security risk management
  • KS X ISO/IEC TR 18044:2005 Information technology-Security techniques-Information security incident management
  • KS X ISO/IEC 27001:2006 Information technology-Security techniques-Information security management systems-Requirements
  • KS X ISO/IEC 27005-2014(2019) Information technology — Security techniques — Information security risk management
  • KS X ISO/IEC 27035-2014(2019) Information technology — Security techniques — Information security incident management
  • KS X ISO/IEC 27002-2014(2019) Information technology — Security techniques — Code of practice for information security management
  • KS X ISO/IEC 27004-2014(2019) Information technology — Security techniques — Information security management — Measurement
  • KS X ISO/IEC TR 18044:2013 Information technology-Security techniques-Information security incident management
  • KS X ISO/IEC TR 18044-2005(2010) Information technology-Security techniques-Information security incident management
  • KS X ISO/IEC 13335-1-2005(2010) Information technology-Security technique-Management of information and communications technology security-Part 1:Concepts and models for information and communications technology security management
  • KS X 1212-3-2007(2012) Information technology-Guidelines for the management of IT Security-Part 3:Techniques for the management of IT security
  • KS X ISO/IEC TR 13335-3-2005(2010) Information technology-Guidelines for the management of IT Security-Part 3:Techniques for the management of IT Security
  • KS X ISO/IEC 27000:2014 Information technology — Security techniques — Information security management systems — Overview and vocabulary
  • KS X ISO/IEC 15408-3-2014(2019) Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
  • KS X ISO/IEC 13335-1:2005 Information technology-Security technique-Management of information and communications technology security-Part 1:Concepts and models for information and communications technology security management
  • KS X ISO/IEC 13335-1:2013 Information technology-Security technique-Management of information and communications technology security-Part 1:Concepts and models for information and communications technology security management
  • KS X ISO/IEC 18028-1-2007(2017) Information technology-Security techniques-IT network security-Part 1:Network security management
  • KS X ISO/IEC 27002:2014 Information technology — Security techniques — Code of practice for information security management
  • KS X ISO/IEC 27001-2014(2019) Information technology — Security techniques — Information security management systems — Requirements
  • KS X ISO/IEC 15408-3:2014 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
  • KS X ISO/IEC 15408-2:2009 Information technology-Security techniques-Evaluation criteria for IT security-Part 2:Security functional components
  • KS X ISO/IEC 15408-3:2009 Information technolog-Security techniques-Evaluation criteria for IT security-Part 3:Security assurance components
  • KS X ISO/IEC 29150-2014(2019) Information technology — Security techniques — Signcryption
  • KS X ISO/IEC 27032:2014 Information technology — Security techniques — Guidelines for cybersecurity
  • KS X ISO/IEC 27032-2014(2019) Information technology — Security techniques — Guidelines for cybersecurity
  • KS X ISO/IEC 15816:2007 Information technology-Security techniques-Security information objects for access control
  • KS X ISO/IEC 15816-2007(2017) Information technology-Security techniques-Security information objects for access control
  • KS X ISO/IEC 18028-2-2007(2017) Information technology-Security techniques-IT network security-Part 2:Network security architecture
  • KS X ISO/IEC 18045-2010(2021) Information technology-Security techniques-Methodology for IT security evaluation
  • KS X ISO/IEC 18028-3-2007(2017) Information technology-Security techniques-IT network security-Part 3:Securing communications between networks using security gateways
  • KS X ISO/IEC 18014-1:2008 Information technology-Security techniques-Time-stamping services-Part 1:Framework
  • KS X ISO/IEC 27003-2011(2021) Information technology-Security techniques-Information security management system implementation guidance
  • KS X ISO/IEC TR 27015-2014(2019) Information technology — Security techniques — Information security management guidelines for financial services
  • KS X ISO/IEC 27003-2011(2017) Information technology-Security techniques-Information security management system implementation guidance
  • KS X ISO/IEC 15408-1-2014(2019) Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
  • KS X ISO/IEC TS 30104:2019 Information technology — Security techniques — Physical security attacks, mitigation techniques and security requirements
  • KS X 0001-8-2001(2021) Glossary of terms used in information technology (Security)
  • KS X 1212-1-2003(2008) Information technology-Guidelines for the management of IT Security-Part 1:Concepts and models for IT Security
  • KS X 1212-2-2003 Information technology-Guidelines for the management of IT Security-Part 2:Managing and planning IT Security
  • KS X ISO/IEC 27010-2014(2019) Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
  • KS X ISO/IEC 27000:2022 Information technology — Security techniques — Information security management systems — Overview and vocabulary
  • KS X ISO/IEC 27000-2014(2019) Information technology — Security techniques — Information security management systems — Overview and vocabulary
  • KS X ISO/IEC 24762-2011(2021) Information technology-Security techniques-Guidelines for information and communications technology disaster recovery services
  • KS X ISO/IEC 24762-2011(2017) Information technology-Security techniques-Guidelines for information and communications technology disaster recovery services
  • KS X ISO/IEC 29100:2010 Information technology--Security techniques--Privacy framework
  • KS X ISO/IEC 18032:2007 Information technology-Security techniques-Prime number generation
  • KS X ISO/IEC 18032-2007(2017) Information technology-Security techniques-Prime number generation
  • KS X ISO/IEC 29100:2014 Information technology — Security techniques — Privacy framework
  • KS X ISO/IEC 19772-2014(2019) Information technology — Security techniques — Authenticated encryption

Professional Standard - Public Safety Standards, Beacon Global Technology

  • GA/Z 1360-2018 Information Security Technology Information Security Standard System Table
  • GA/T 681-2007 Information security technology-Technical requirements of gateway
  • GA/T 681-2018 Information Security Technology Gateway Security Technical Requirements
  • GA/T 1359-2018 Information Security Technology Information Asset Security Management Product Security Technical Requirements
  • GA/T 684-2007 Information security technology-Technical requirements for switch security
  • GA/T 682-2007 Information security technology Technical requirements for router security
  • GA/T 683-2007 Information security technology-Technical requirements for firewall security
  • GA/T 1546-2019 Information Security Technology Wireless WiFi Signal Monitoring Product Safety Technical Requirements

International Electrotechnical Commission (IEC), Beacon Global Technology

  • ISO/IEC TR 27103:2018 Information technology - Security techniques - Cybersecurity and ISO and IEC Standards
  • ISO/IEC TR 30109:2015 Information technology -- User interfaces -- Worldwide availability of personalized computer environments
  • ISO/IEC TR 27016:2014 Information technology - Security techniques - Information security management - Organizational economics
  • ISO/IEC 27000:2014 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • ISO/IEC 29147:2014 Information technology - Security techniques - Vulnerability disclosure

ANSI - American National Standards Institute, Beacon Global Technology

  • INCITS/ISO/IEC 15408-3:1999 Information technology Security techniques Evaluation criteria for IT security Part 3: Security assurance requirements (Adopted by INCITS)
  • INCITS/ISO/IEC 15408-2:1999 Information technology Security techniques Evaluation criteria for IT security Part 2: Security functional requirements (Adopted by INCITS)
  • INCITS/ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
  • INCITS/ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements
  • INCITS/ISO/IEC 27002:2013 Information technology - Security techniques - Code of practice for information security controls
  • INCITS/ISO/IEC TR 18044:2004 Information technology – Security techniques - Information security incident management (TECHNICAL REPORT)
  • INCITS/ISO/IEC TR 15446:2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets (Technical Report)
  • INCITS/ISO/IEC 17799:2005 Information technology Security techniques Code of practice for information security management (INCITS Adoption)
  • INCITS 24762-2008 Information Technology — Security Techniquies — Guidelines for information and communications technology disaster recovery services
  • INCITS/ISO/IEC 18032:2005 Information technology — Security techniques — Prime number generation

Indonesia Standards, Beacon Global Technology

British Standards Institution (BSI), Beacon Global Technology

  • PD ISO/IEC TR 27103:2018 Information technology. Security techniques. Cybersecurity and ISO and IEC Standards
  • BS ISO/IEC 27014:2013 Information technology. Security techniques. Governance of information security
  • BS ISO/IEC 27014:2020 Information security, cybersecurity and privacy protection. Governance of information security
  • BS ISO/IEC 15408-3:2009 Information technolgy - Security techniques - Evaluation criteria for IT security - Security assurance components
  • BS ISO/IEC 15408-2:2008 Information technology - Security techniques - Evaluation criteria for IT security - Security functional components
  • BS ISO/IEC 15408-3:2008 Information technolgy - Security techniques - Evaluation criteria for IT security - Security assurance components
  • BS ISO/IEC 18014-1:2008 Information technology - Security techniques - Time- stamping services - Framework
  • BS EN ISO/IEC 15408-2:2020 Information technology. Security techniques. Evaluation criteria for IT security. Security functional components
  • BS ISO/IEC 27004:2010 Information technology. Security techniques. Information security management. Measurement
  • BS ISO/IEC 27004:2009 Information technology - Security techniques - Information security management - Measurement
  • BS ISO/IEC 27005:2011 Information technology. Security techniques. Information security risk management
  • BS ISO/IEC 27035:2011 Information technology. Security techniques. Information security incident management
  • BS EN ISO/IEC 27040:2016 Information technology. Security techniques. Storage security
  • BS EN ISO/IEC 15408-1:2020 Information technology. Security techniques. Evaluation criteria for IT security. Introduction and general model
  • BS ISO/IEC 27040:2015 Information technology. Security techniques. Storage security
  • BS ISO/IEC 27036-3:2013 Information technology. Security techniques. Information security for supplier relationships. Guidelines for information and communication technology supply chain securit
  • BS ISO/IEC 17799:2005 Technologies de l'information. Techniques de securite. Code de bonne practique pour la gestion de la securite de l'information (French translation of BS ISO/IEC 17799:2005)
  • BS ISO/IEC 27001:2013 Information technology. Security techniques. Information security management systems. Requirements
  • BS EN ISO/IEC 27001:2017 Information technology. Security techniques. Information security management systems. Requirements
  • BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
  • BS ISO/IEC 27032:2012 Information technology. Security techniques. Guidelines for cybersecurity
  • BS PD ISO/TR 28380-1:2014 Health informatics. IHE global standards adoption. Process
  • BS PD ISO/TR 28380-3:2014 Health informatics. IHE global standards adoption. Deployment
  • PD ISO/TR 28380-3:2014 Health informatics. IHE global standards adoption. Deployment
  • PD ISO/TR 28380-1:2014 Health informatics. IHE global standards adoption. Process
  • BS PD ISO/IEC TR 27016:2014 Information technology. Security techniques. Information security management. Organizational economics
  • BS ISO/IEC 27002:2013 Information technology. Security techniques. Code of practice for information security controls
  • BS ISO/IEC 27033-3:2011 Information technology. Security techniques. Network security. Reference networking scenarios. Threats, design techniques and control issues
  • BS EN ISO/IEC 18045:2020 Information technology. Security techniques. Methodology for IT security evaluation
  • BS ISO/IEC 27033-4:2014 Information technology. Security techniques. Network security. Securing communications between networks using security gateways
  • BS ISO/IEC 27007:2017 Information technology. Security techniques. Guidelines for information security management systems auditing
  • BS ISO/IEC 27036-2:2014 Information technology. Security techniques. Information security for supplier relationships. Requirements
  • BS ISO/IEC 27003:2010 Information technology - Security techniques - Information security management system implementation guidance
  • BS ISO/IEC 27007:2011 Information technology. Security techniques. Guidelines for information security management systems auditing
  • BS PD ISO/IEC TS 30104:2015 Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements
  • PD ISO/IEC TS 30104:2015 Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements
  • BS ISO/IEC 19790:2012 Information technology. Security techniques. Security requirements for cryptographic modules
  • BS ISO/IEC 18370-1:2016 Information technology. Security techniques. Blind digital signatures. General
  • BS ISO/IEC 27034-6:2016 Information technology. Security techniques. Application security. Case studies
  • PD ISO/IEC TR 19791:2010 Information technology. Security techniques. Security assessment of operational systems
  • BS ISO/IEC 27010:2012 Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications
  • BS ISO/IEC 27000:2016 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • BS EN ISO/IEC 27000:2017 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • BS ISO/IEC 27000:2014 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • BS ISO/IEC 27000:2009 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • BS EN ISO/IEC 27000:2020 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • BS ISO/IEC 27000:2012 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • BS ISO/IEC 29147:2014 Information technology. Security techniques. Vulnerability disclosure
  • BS ISO/IEC 19772:2009 Information technology - Security techniques - Authenticated encryption
  • BS ISO/IEC 18032:2005 Information technology - Security techniques - Prime number generation
  • BS ISO/IEC 29100:2011 Information technology. Security techniques. Privacy framework

International Organization for Standardization (ISO), Beacon Global Technology

  • ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security
  • ISO/IEC 27014:2020 Information security, cybersecurity and privacy protection -- Governance of information security
  • ISO/IEC TR 15446:2004 Information technology - Security techniques - Guide for the production of protection profiles and security targets
  • ISO/IEC 27004:2009 Information technology - Security techniques - Information security management - Measurement
  • ISO/IEC 27005:2011 Information technology - Security techniques - Information security risk management
  • ISO/IEC 27035:2011 Information technology - Security techniques - Information security incident management
  • ISO/IEC TR 18044:2004 Information technology - Security techniques - Information security incident management
  • ISO/IEC 27001:2005 Information technology - Security techniques - Information security management systems - Requirements
  • ISO/IEC 27005:2008 Information technology - Security techniques - Information security risk management
  • ISO/IEC 27005:2018 Information technology — Security techniques — Information security risk management
  • ISO/IEC 27040:2015 Information technology - Security techniques - Storage security
  • ISO/IEC TR 15446:2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
  • ISO/IEC 13335-1:2004 Information technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management
  • ISO/IEC 17799:2000 Information technology - Code of practice for information security management
  • ISO/IEC 27003:2017 Information technology - Security techniques - Information security management systems - Guidance
  • ISO/IEC 27002:2005 Information technology - Security techniques - Code of practice for information security management
  • ISO/IEC 27001:2013 Information technology.Security techniques.Information security management systems.Requirements
  • ISO/IEC 27002:2013 Information technology.Security techniques.Code of practice for information security controls
  • ISO/IEC TS 27008:2019 Information technology — Security techniques — Guidelines for the assessment of information security controls
  • ISO/IEC 17799:2005 Information technology - Security techniques - Code of practice for information security management
  • ISO/IEC TR 15446:2017 Information technology — Security techniques — Guidance for the production of protection profiles and security targets
  • ISO/IEC 15408-3:2005 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements
  • ISO/IEC 15408-3:2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components
  • ISO/IEC 29150:2011 Information technology - Security techniques - Signcryption
  • ISO/IEC 15816:2002 Information technology - Security techniques - Security information objects for access control
  • ISO/IEC 27036-3:2013 Information technology.Security techniques.Information security for supplier relationships.Part 3: Guidelines for information and communication technology supply chain security
  • ISO/IEC 18014-1:2002 Information technology - Security techniques; Time-stamping services - Part 1: Framework
  • ISO/IEC 18014-1:2008 Information technology - Security techniques - Time-stamping services - Part 1: Framework
  • ISO/IEC 17799:2005/Cor 1:2007 Information technology - Security techniques - Code of practice for information security management; Technical Corrigendum 1
  • ISO/IEC 27003:2010 Information technology - Security techniques - Information security management system implementation guidance
  • ISO/IEC TR 15947:2002 Information technology - Security techniques - IT intrusion detection framework
  • ISO/IEC TS 30104:2015 Information Technology - Security Techniques - Physical Security Attacks, Mitigation Techniques and Security Requirements
  • ISO/IEC 19772:2009 Information technology - Security techniques - Authenticated encryption
  • ISO/IEC 19772:2020 Information security -- Authenticated encryption
  • ISO/IEC 27010:2012 Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
  • ISO/IEC 27010:2015 Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
  • ISO/IEC 27007:2011 Information technology - Security techniques - Guidelines for information security management systems auditing
  • ISO/IEC 27000:2009 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • ISO/IEC 27000:2012 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • ISO/IEC 27000:2016 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • ISO/IEC TR 27015:2012 Information technology - Security techniques - Information security management guidelines for financial services
  • ISO/IEC TR 27008:2011 Information technology - Security techniques - Guidelines for auditors on information security controls
  • ISO/IEC 27000:2018 Information technology — Security techniques — Information security management systems — Overview and vocabulary
  • ISO/IEC 24762:2008 Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
  • ISO/IEC TS 29003:2018 Information technology — Security techniques — Identity proofing
  • ISO/IEC 18032:2005 Information technology - Security techniques - Prime number generation
  • ISO/IEC 29100:2011 Information technology - Security techniques - Privacy framework
  • ISO/IEC 29147:2018 Information technology — Security techniques — Vulnerability disclosure

Danish Standards Foundation, Beacon Global Technology

  • DS/ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security
  • DS/ISO/IEC 18045:2008 Information technology - Security techniques - Methodology for IT security evaluation
  • DS/ISO/IEC 27035:2011 Information technology - Security techniques - Information security incident management
  • DS/ISO/IEC 27004:2010 Information technology - Security techniques - Information security management - Measurement
  • DS/ISO/IEC 27005:2011 Information technology - Security techniques - Information security risk management
  • DS/ISO/IEC 15408-2:2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components
  • DS/ISO/IEC 15408-3:2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components
  • DS/ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements
  • DS/ISO/IEC 27002:2013 Information technology - Security techniques - Code of practice for information security controls
  • DS/ISO/IEC 29150:2012 Information technology - Security techniques - Signcryption
  • DS/ISO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity
  • DS/ISO/IEC 15816:2002 Information technology - Security techniques - Security information objects for access control
  • DS/ISO/IEC TR 27008:2011 Information technology - Security techniques - Guidelines for auditors on information security controls
  • DS/ISO/IEC TR 15446:2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
  • DS/ISO/IEC 19792:2009 Information technology - Security techniques - Security evaluation of biometrics
  • DS/ISO/IEC TR 27015:2013 Information technology - Security techniques - Information security management guidelines for financial services
  • DS/ISO/IEC 27003:2010 Information technology - Security techniques - Information security management system implementation guidance
  • DS/ISO/IEC 27007:2011 Information technology - Security techniques - Guidelines for information security management systems auditing
  • DS/ISO/IEC 27010:2012 Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
  • DS/ISO/IEC 27000:2013 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • DS/ISO/IEC 24762:2008 Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
  • DS/ISO/IEC 19772:2009 Information technology - Security techniques - Authenticated encryption
  • DS/ISO/IEC 18032:2005 Information technology - Security techniques - Prime number generation
  • DS/ISO/IEC 29100:2012 Information technology - Security techniques - Privacy framework

Japanese Industrial Standards Committee (JISC), Beacon Global Technology

  • JIS Q 27014:2015 Information technology -- Security techniques -- Governance of information security
  • JIS Q 13335-1:2006 Information technology -- Security techniques -- Management of information and communications technology security -- Part 1: Concepts and models for information and communications technology security management
  • JIS Q 27001:2006 Information technology -- Security techniques -- Information security management systems -- Requirements
  • JIS Q 27001:2014 Information technology -- Security techniques -- Information security management systems -- Requirements
  • JIS X 5070-3:2000 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 3: Security assurance requirements
  • JIS Q 27002:2006 Information technology -- Security techniques -- Code of practice for information security management
  • JIS Q 27002:2014 Information technology -- Security techniques -- Code of practice for information security controls
  • JIS X 5070-2:2000 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional requirements
  • JIS X 5063-1:2005 Information technology -- Security techniques -- Time-stamping services -- Part 1: Framework
  • JIS Q 27000:2014 Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
  • JIS Q 27000:2019 Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary

General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China, Beacon Global Technology

  • GB/T 32923-2016 Information Technology Security Technology Information Security Governance
  • GB/T 30270-2013 Information technology.Security technology.Methodology for IT security evaluation
  • GB/T 31497-2015 Information technology.Security techniques.Information security management.Measurement
  • GB/T 31722-2015 Information technology.Security techniques.Information security risk management
  • GB 15304-1994 Global maritime distress and safety system(GMDSS). Technical requirement for marine telecommunication equipment
  • GB/T 16725-1997 Technical requirements for transmitter and receiver in globle marine distress & safty system
  • GB/T 20271-2006 Information security technology.Common security techniques requirement for information system
  • GB/T 21052-2007 Information security technology.Physical security technical requirement for information system
  • GB/T 31496-2023 Information Technology Security Technical Information Security Management System Guidelines
  • GB/T 22081-2016 Information Technology—Security Techniques—Code ofpractice for information security controls
  • GB/Z 20985-2007 Information technology.Security techniques.Information security incident management guide
  • GB/T 22080-2008 Information technology.Security techniques.Information security management systems.Requirements
  • GB/T 22081-2008 Information technology.Security techniques.Code of practice for information security management
  • GB/T 22080-2016 Information technology.Security techniques.Information security management systems.Requirements
  • GB/T 25069-2010 Information security technology.Glossary
  • GB/T 28458-2012 Information security technology.Vulnerability identification and description specification
  • GB/T 18336.3-2015 Information technology.Security techniques.Evaluation criteria for IT security.Part 3:Security assurance components
  • GB/T 18336.2-2015 Information technology.Security techniques.Evaluation criteria for IT security.Part 2: Security functional components
  • GB/T 17424-1998 Technical requirements of differential global positioning system
  • GB/T 18018-2007 Information security technology.Technical requirements for router security
  • GB/T 21028-2007 Information security technology- Security techniques requirement for server
  • GB/T 42570-2023 Information security technology—Security framework for blockchain technology
  • GB/T 31496-2015 Information technology.Security techniques.Information securitymanagement system implementation guidance
  • GB/T 18336.3-2001 Information technology--Security technology--Evaluation criteria for IT security Part 3: Security assurance requirements
  • GB/T 18336.2-2001 Information technology--Security techniques--Evaluation criteria for IT security Part 2: Security functional requirements
  • GB/T 18336.2-2008 Information technology. Security techniques. Evaluation criteria for IT security. Part 2: Security functional requirements
  • GB/T 18336.3-2008 Information technology. Security techniques. Evaluation criteria for IT security. Part 3: Security assurance requirements
  • GB/T 19715.1-2005 Information technology-Guidelines for the management of IT Security-Part 1:Concepts and models of IT Security
  • GB/T 19715.2-2005 Information technology-Guidelines for the management of IT Security-Part 2:Managing and planning IT Security
  • GB/Z 29830.2-2013 Information technology.Security technology.A framework for IT security assurance.Part 2:Assurance methods
  • GB/T 20270-2006 Information security technology. Basis security techniques requirement for network
  • GB/T 20272-2006 Information security technology.Security techniques requirement for operating system
  • GB/T 42564-2023 Information security technology—Security technical requirements for edge computing
  • GB/T 32920-2016 Information technology security technology information security management for inter-industry and inter-organizational communications
  • GB/T 32921-2016 Information Security Technology Information Technology Product Supplier Code of Conduct Security
  • GB/T 29246-2012 Information technology.Security techniques.Information security management systems.Overview and vocabulary
  • GB/Z 32916-2016 Information Technology Security Technical Information Security Controls Auditor's Guide

Association Francaise de Normalisation, Beacon Global Technology

  • NF Z74-207*NF EN ISO/IEC 18045:2020 Information technology - Security techniques - Methodology for IT security evaluation
  • NF Z74-225:2013 Information technology - Security techniques - Information security risk management
  • NF Z74-225*NF ISO/IEC 27005:2018 Information technology - Security techniques - Information security risk management
  • NF Z74-240*NF EN ISO/IEC 27040:2017 Information technology - Security techniques - Storage security
  • NF EN ISO/IEC 27040:2017 Technologies de l'information - Techniques de sécurité - Sécurité de stockage
  • NF Z74-203-3*NF EN ISO/IEC 15408-3:2020 Information technology - Security techniques - Evaluation criteria for IT security - Part 3 : security assurance components
  • NF Z74-203-2*NF EN ISO/IEC 15408-2:2020 Information technology - Security techniques - Evaluation criteria for IT security - Part 2 : security functional components
  • NF EN ISO/IEC 15408-3:2020 Technologies de l'information - Techniques de sécurité - Critères d'évaluation pour la sécurité TI - Partie 3 : composants d'assurance de sécurité
  • NF Z74-221:2013 Information technology - Security techniques - Information security management systems - Requirements
  • NF Z74-222:2014 Information technology - Security techniques - Code of practice for information security controls
  • NF Z74-222*NF EN ISO/IEC 27002:2017 Information technology - Security techniques - Code of practice for information security controls
  • NF Z74-221*NF EN ISO/IEC 27001:2017 Information technology - Security techniques - Information security management systems - Requirements
  • NF EN ISO/IEC 27001:2017 Technologies de l'information - Techniques de sécurité - Systèmes de management de la sécurité de l'information - Exigences
  • NF EN ISO/IEC 15408-2:2020 Technologies de l'information - Techniques de sécurité - Critères d'évaluation pour la sécurité TI - Partie 2 : composants fonctionnels de sécurité
  • NF EN ISO/IEC 18045:2020 Technologies de l'information - Techniques de sécurité - Méthodologie pour l'évaluation de sécurité TI
  • NF EN ISO/IEC 27019:2020 Technologies de l'information - Techniques de sécurité - Mesures de sécurité de l'information pour l'industrie des opérateurs de l'énergie
  • NF Z74-220:2015 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • NF Z74-220*NF EN ISO/IEC 27000:2020 Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • NF EN ISO/IEC 27000:2020 Technologies de l'information - Techniques de sécurité - Systèmes de management de la sécurité de l'information - Vue d'ensemble et vocabulaire
  • NF ISO/IEC 27031:2014 Technologies de l'information - Techniques de sécurité - Lignes directrices pour la préparation des technologies de la communication et de l'information pour la continuité d'activité
  • NF Z74-247*NF EN ISO/IEC 29100:2020 Information technology - Security techniques - Privacy framework

Underwriters Laboratories (UL), Beacon Global Technology

ZA-SANS, Beacon Global Technology

  • SANS 15446:2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
  • SANS 27005:2009 Information technology - Security techniques - Information security risk management
  • SANS 18044:2008 Information technology - Security techniques - Information security incident management
  • SANS 15446:2005 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets
  • SANS 13335-1:2005 Information technology - Security techniques - Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
  • SANS 18028-1:2009 Information technology - Security techniques - IT network security Part 1: Network security management
  • SANS 27002:2008 Information technology - Security techniques - Code of practice for information security management
  • SANS 17799:2005 Information technology - Security techniques - Code of practice for information security management
  • SANS 15408-2:2007 Information technology - Security techniques - Evaluation criteria for IT security Part 2: Security functional requirements
  • SANS 15408-3:2007 Information technology - Security techniques - Evaluation criteria for IT security Part 3: Security assurance requirements
  • SANS 15408-3:2009 Information technology - Security techniques - Evaluation criteria for IT security Part 3: Security assurance components
  • SANS 18045:2007 Information technology - Security techniques - Methodology for IT security evaluation
  • SANS 18014-1:2002 Information technology — Security techniques — Time-stamping services part 1:Framework
  • SANS 18014-1:2009 Information technology - Security techniques - Time stamping services Part 1: Framework
  • SANS 18028-3:2009 Information technology - Security techniques - IT network security Part 3: Securing communications between networks using security gateways
  • SANS 15816:2006 Information technology - Security techniques - Security information objects for access control
  • SANS 19772:2009 Information technology - Security techniques - Authenticated encryption
  • SANS 18032:2007 Information technology - Security techniques - Prime number generation

HU-MSZT, Beacon Global Technology

ATIS - Alliance for Telecommunications Industry Solutions, Beacon Global Technology

  • 0300091-2018 Structure for Global Serialization of Information and Communications Technology (ICT) Network Infrastructure Equipment

ETSI - European Telecommunications Standards Institute, Beacon Global Technology

  • GS OEU 008-2013 Operational energy Efficiency for Users (OEU); Global KPI for Information and Communication Technology Nodes (V1.1.1)

KR-KS, Beacon Global Technology

  • KS X ISO/IEC TR 15446-2021 Information technology — Security techniques — Guidance for the production of protection profiles and security targets
  • KS X ISO/IEC 18028-1-2007(2022) Information technology-Security techniques-IT network security-Part 1:Network security management
  • KS X ISO/IEC 15816-2007(2022) Information technology-Security techniques-Security information objects for access control
  • KS X ISO/IEC 18028-2-2007(2022) Information technology-Security techniques-IT network security-Part 2:Network security architecture
  • KS X ISO/IEC TS 30104-2019 Information technology — Security techniques — Physical security attacks, mitigation techniques and security requirements
  • KS X ISO/IEC 27000-2022 Information technology — Security techniques — Information security management systems — Overview and vocabulary

European Committee for Standardization (CEN), Beacon Global Technology

  • EN ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022)
  • EN ISO/IEC 27040:2016 Information technology - Security techniques - Storage security
  • EN ISO/IEC 27000:2020 Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018)

RU-GOST R, Beacon Global Technology

  • GOST R ISO/IEC 27004-2021 Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation
  • GOST R ISO/IEC TR 18044-2007 Information technology. Security techniques. Information security incident management
  • GOST R ISO/IEC 27005-2010 Information technology. Security techniques. Information security risk management
  • GOST R ISO/IEC 27004-2011 Information technology. Security techniques. Information security management. Measurement
  • GOST R ISO/IEC TR 13335-3-2007 Information technology. Security techniques. Part 3. Techniques for the management of information technology security
  • GOST R ISO/IEC TR 15446-2008 Information technology. Security techniques. Guide for the production of protection profiles and security targets
  • GOST R ISO/IEC 15408-3-2008 Information technology. Security techniques. Evaluation criteria for IT security. Part 3. Security assurance requirements
  • GOST R 56045-2014 Information technology. Security techniques. Guidelines for auditors on information security controls
  • GOST R ISO/IEC 27002-2021 Information technology. Security techniques. Code of practice for information security controls
  • GOST R 56045-2021 Information technology. Security techniques. Guidelines for the assessment of information security controls
  • GOST R ISO/IEC 17799-2005 Information technology. Code of practice for information security management
  • GOST R ISO/IEC 27001-2006 Information technology. Security techniques. Information security management systems. Requirements
  • GOST R ISO/IEC 27002-2012 Information technology. Security techniques. Code of practice for information security management
  • GOST R ISO/IEC 15408-2-2002 Information technology. Security techniques. Evaluation criteria for IT security. Part 2. Security functional requirements
  • GOST R ISO/IEC 15408-3-2002 Information technology. Security techniques. Evaluation criteria for IT security. Part 3. Security assurance requirements
  • GOST R ISO/IEC 15408-2-2008 Information technology. Security techniques. Evaluation criteria for IT security. Part 2. Security functional requirements
  • GOST R ISO/IEC 15408-3-2013 Information technology. Security techniques. Evaluation criteria for IT security. Part 3. Security assurance requirements
  • GOST R ISO/IEC 15408-2-2013 Information technology. Security techniques. Evaluation criteria for IT security. Part 2. Security functional components
  • GOST R 59503-2021 Information technology. Security techniques. Information security management. Organizational economics
  • GOST R 57628-2017 Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets
  • GOST R ISO/IEC 18045-2008 Information technology. Security techniques. Methodology for IT security evaluation
  • GOST R ISO/IEC 18045-2013 Information technology. Security techniques. Methodology for IT security evaluation
  • GOST R 52454-2005 Global navigation satellite system and global position system. Personal receiver. Technical requirements
  • GOST R ISO/IEC 27003-2021 Information technology. Security techniques. Information security management systems. Guidance for implementation
  • GOST R ISO/IEC 27003-2012 Information technology. Security techniques. Information security management systems. Implementation guidance of information security management system
  • GOST R ISO/IEC 27007-2014 Information technology. Security techniques. Guidelines for information security management systems auditing
  • GOST R ISO/IEC 13335-1-2006 Information technology. Security techniques. Part 1. Concepts and models for information and communications technology security management
  • GOST R ISO/IEC 27000-2021 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • GOST R ISO/IEC 27000-2012 Information technology. Security techniques. Information security management systems. Overview and vocabulary
  • GOST R 59515-2021 Information technology. Security techniques. Identity proofing

German Institute for Standardization, Beacon Global Technology

  • DIN EN ISO/IEC 27040:2017-03 Information technology - Security techniques - Storage security (ISO/IEC 27040:2015); German version EN ISO/IEC 27040:2016
  • DIN EN ISO/IEC 15408-3:2021-06 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2008, Corrected version 2011-06-01); German version EN ISO/IEC 15408-3:2020, only on CD-ROM / Note: CD-ROM
  • DIN EN ISO/IEC 15408-2:2020-12 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008); German version EN ISO/IEC 15408-2:2020, only on CD-ROM / Note: CD-ROM
  • DIN ISO/IEC 27001:2008 Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2005); English version of DIN ISO/IEC 27001:2008-09
  • DIN EN ISO/IEC 27001:2017-06 Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015); German version EN ISO/IEC 27001:2017
  • DIN EN ISO/IEC 27002:2017-06 Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015); German version EN ISO/IEC 27002:2017 / Note: To be replaced by DIN EN ISO/IEC 27002 (2022-08).
  • DIN ISO/IEC 15408-3:2007 Information technology - Security techniques - Evaluation criteria for IT Security - Part 3: Security assurance requirements (ISO/IEC 15408-3:2005); Text in English
  • DIN ISO/IEC 15408-2:2007 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements (ISO/IEC 15408-2:2005); Text in English
  • DIN ISO/IEC 27002:2008 Information technology - Security techniques - Code of practice for information security management (ISO/IEC 27002:2005); English version of DIN ISO 27002:2008-09
  • DIN EN ISO/IEC 18045:2021-02 Information technology - Security techniques - Methodology for IT security evaluation (ISO/IEC 18045:2008); German version EN ISO/IEC 18045:2020, only on CD-ROM / Note: CD-ROM
  • DIN EN ISO/IEC 27000:2020-06 Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018); German version EN ISO/IEC 27000:2020

ES-UNE, Beacon Global Technology

  • UNE-EN ISO/IEC 27040:2016 Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) (Endorsed by AENOR in December of 2016.)
  • UNE-EN ISO/IEC 15408-2:2020 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008) (Endorsed by Asociación Española de Normalización in May of 2020.)
  • UNE-EN ISO/IEC 15408-3:2020 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2008, Corrected version 2011-05)
  • UNE-EN ISO/IEC 18045:2020 Information technology - Security techniques - Methodology for IT security evaluation (ISO/IEC 18045:2008) (Endorsed by Asociación Española de Normalización in May of 2020.)
  • UNE-EN ISO/IEC 27000:2021 Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018)

Professional Standard - Surveying and Mapping, Beacon Global Technology

  • CH/T 9033-2022 Specifications for global digital surface model production
  • CH/T 9034-2022 Specifications for global digital orthophoto map production

Group Standards of the People's Republic of China, Beacon Global Technology

  • T/ZKJXX 00003-2019 Technical requirements for GNSS signal record & playback instrument
  • T/GNDECPA 0018-2022 Public technical components of the global traceability system
  • T/GZAS 018-2022 Technical standard for safe and trusted circulation of data elements
  • T/NYGQ 002-2023 Steel ball manufacturing enterprise safety production technical specification

国家市场监督管理总局、中国国家标准化管理委员会, Beacon Global Technology

  • GB/T 36630.1-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 1:General principles
  • GB/T 37964-2019 Information security technology—Guide for de-identifying personal information
  • GB/T 36630.3-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 3: Operating system
  • GB/T 36630.4-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 4: Office suite
  • GB/T 25069-2022 Information security techniques—Terminology
  • GB/T 36630.5-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 5: General purpose computer
  • GB/T 36630.2-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 2: Central processing unit
  • GB/T 37950-2019 Information security technology—Security technical requirements for desktop cloud
  • GB/T 18018-2019 Information security technology—Technical requirement for router security
  • GB/T 40653-2021 Information security technology—Technical requirements for security processor
  • GB/T 37095-2018 Information security technology—Security basic technical requirements for office information systems
  • GB/T 28450-2020 Information technology—Security techniques—Guidelines for information security management systems auditing
  • GB/T 39477-2020 Information security technology—Government information sharing—Data security technology requirements
  • GB/T 37091-2018 Information security technology—Security office USB disk technology requirement
  • GB/T 36629.2-2018 Information security technology—Security techniques requirement for citizen cyber electronic identity—Part 2:Security technique requirements of carrier
  • GB/T 37955-2019 Information security technology—Security technique requirements for numerical control network
  • GB/T 36950-2018 Information security technology—Security technical requirements of smart card (EAL4+)
  • GB/T 20272-2019 Information security technology—Security technical requirements for operating system
  • GB/T 37939-2019 Information security technology—Security techniques requirement for network storage
  • GB/T 36968-2018 Information security technology —Technical specification for IPSec VPN

国家技术监督局, Beacon Global Technology

  • GB/T 15304-1994 Global maritime distress and safety system(GMDSS)--Technical requirement for marine telecommunication equipment

American National Standards Institute (ANSI), Beacon Global Technology

IT-UNI, Beacon Global Technology

未注明发布机构, Beacon Global Technology

  • BS ISO/IEC 13335-1:2004 Information technology — Security techniques — Management of information and communications technology security — Part 1 : Concepts and models for information and communications technology security management
  • ISO/IEC 27001:2013/Cor 1:2014 Information technology. Security technology. Information security management. Requirements technical corrigendum 1
  • ISO/IEC 27001:2013/Cor 2:2015 Information technology. Security technology. Information security management. Requirements technical corrigendum 2
  • BS EN ISO/IEC 27002:2017 Information technology — Security techniques — Code of practice for information security controls
  • BS ISO/IEC 29150:2011(2014) Information technology — Security techniques — Signcryption
  • ISO/IEC 24672:2008 Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services

Jilin Provincial Standard of the People's Republic of China, Beacon Global Technology

  • DB22/T 3288-2021 Technical Regulations for Safety Production of Stropharia stropharcoides

Chongqing Provincial Standard of the People's Republic of China, Beacon Global Technology

  • DB50/T 581-2015 Technical specifications for safe operation of tethered balloons

Taiwan Provincial Standard of the People's Republic of China, Beacon Global Technology

  • CNS 14929-3-2005 Information technology - Guidelines for the management of IT security - Part 3: Techniques for the management of IT security
  • CNS 14929.3-2005 Information technology - Guidelines for the management of IT security - Part 3: Techniques for the management of IT security
  • CNS 15408-3-2004 Information technolgoy – Security techniques – Evaluation criteria for ITSecurity – Part 3: Security assurance requirements
  • CNS 15408.2-2004 Information technology – Security techniques – Evaluation criteria for ITsecurity – Part 2: Security functional requirements
  • CNS 15408.3-2004 Information technolgoy – Security techniques – Evaluation criteria for ITSecurity – Part 3: Security assurance requirements
  • CNS 15408-2-2004 Information technology – Security techniques – Evaluation criteria for ITsecurity – Part 2: Security functional requirements
  • CNS 17799-2006 Information technology - Security techniques - Code of practice for information security management
  • CNS 27002-2007 Information technology - Security techniques - Code of practice for information security management
  • CNS 14992-2006 Information technology - Security techniques - IT intrusion detection framework
  • CNS 27001-2007 Information technology - Security techniques - Information security management systems - Requirements
  • CNS 15135-2007 Information technology - Security techniques - Security requirements for cryptographic modules
  • CNS 14929-2-2005 Information technology - Guidelines for the management of IT security - Part 2: Managing and planning IT security
  • CNS 14929-1-2005 Information technology - Guidelines for the management of IT security - Part 1: Concepts and models for IT security
  • CNS 14929.2-2005 Information technology - Guidelines for the management of IT security - Part 2: Managing and planning IT security
  • CNS 14929.1-2005 Information technology - Guidelines for the management of IT security - Part 1: Concepts and models for IT security

NZ-SNZ, Beacon Global Technology

BELST, Beacon Global Technology

  • STB 34.101.30-2017 Information technology. Security techniques. Information systems. Classification
  • STB 34.101.11-2009 Information technologies and security. Evaluation criteria for information technology security. Protection profile for operation system used in trusted zone of corporate network

AENOR, Beacon Global Technology

  • UNE-ISO/IEC TR 15446:2013 IN Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets
  • UNE-ISO/IEC 27000:2014 Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
  • UNE-ISO/IEC 27000:2012 Information technology. Security techniques. Information security management systems. Overview and vocabulary

IX-ISO/IEC, Beacon Global Technology

  • ISO/IEC 27002:2013/Cor 1:2014 Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1
  • ISO/IEC 27002:2013/Cor 2:2015 Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2

Professional Standard - Electron, Beacon Global Technology

Military Standard of the People's Republic of China-General Armament Department, Beacon Global Technology

  • GJB 2228A-2001 Global Positioning System (GPS) Measurement Technical Regulations

ITU-T - International Telecommunication Union/ITU Telcommunication Sector, Beacon Global Technology

  • STIT-2003 Security in Telecommunications and Information Technology

PH-BPS, Beacon Global Technology

  • PNS ISO/IEC 27036-3:2021 Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security

GOSTR, Beacon Global Technology

  • GOST R 59215-2020 Information technology. Security techniques. Information security for supplier relationships. Part 3. Guidelines for information and communication technology supply chain security

Professional Standard - Aerospace, Beacon Global Technology

  • QJ 2361-1992 General technical requirements for satellite communication earth stations

Shandong Provincial Standard of the People's Republic of China, Beacon Global Technology

  • DB37/T 3303-2018 Information Security Technology Internal Control Security Management Technical Specifications
  • DB37/T 1660-2020 Technical regulations for safe and high-quality production of Stropharia stropharcoides

CZ-CSN, Beacon Global Technology

  • CSN 03 8206-1978 Division lines of the globe into climatical regions for technical purposes

Professional Standard - Urban Construction, Beacon Global Technology

  • CJJ 73-1997 Technical specification for urban surveying using global positioning system

Hebei Provincial Standard of the People's Republic of China, Beacon Global Technology

  • DB13/T 437.6-2000 Technical Regulations for Safety and Pest Control of Cabbage Diseases and Pests




Copyright ©2007-2023 ANTPEDIA, All Rights Reserved