This document presents specific characteristics of industrial internet platforms (IIPs), including related security threats, context-specific security control objectives and security…
Cybersecurity
ITU-T X.1750 (09/2020)
Guidelines on security of big data as a service for big data service providers
Big data as a service (BDaaS) is a cloud service category that provides cloud service customers with capabilities to collect,…
ISO/IEC TS 27570:2021
PD ISO/IEC TS 27570:2021
Privacy protection. Privacy guidelines for smart cities
The document takes a multiple agency as well as a citizen-centric viewpoint. It provides guidance on: ā smart city ecosystem…
ISO/IEC TS 27022:2021
PD ISO/IEC TS 27022:2021
Information technology. Guidance on information security management system processes
This document defines a process reference model (PRM) for the domain of information security management, which is meeting the criteria…
ISO/IEC 20547-4:2020
BS ISO/IEC 20547-4:2020
Information technology. Big data reference architecture. Security and privacy
What is ISO/IEC 20547-4 about? ISO/IEC 20547 is an international standard on information technology that aims to improve security and…
ISO/IEC TS 27110:2021
PD ISO/IEC TS 27110:2021
Information technology, cybersecurity and privacy protection. Cybersecurity framework development guidelines
What is ISO/IEC TS 27110 about? ISO/IEC TS 27110 specifies guidelines for developing a cybersecurity framework. It is applicable to…
ISO/IEC 27014:2020
BS ISO/IEC 27014:2020
Information security, cybersecurity and privacy protection. Governance of information security
What is ISO 27014 on the governance of information security about? ISO 27014 discusses information security, cybersecurity and privacy protection.…
IEEE 2813-2020
IEEE Standard for Big Data Business Security Risk Assessment
New IEEE Standard – Active. This standard can be applied to internet-based business scenarios, and can also be served serve…
IEEE 2842-2021
IEEE Recommended Practice for Secure Multi-Party Computation
Data has become one of the most important assets in ICT area. Secure multi-party computation plays a very important role…