ISO/IEC /FDAmd 1. Additional terminology and concepts. General information. Status: Deleted. Edition: 1. Number of pages: Technical. ISO/IEC •defines terms for identity management, and •specifies core concepts of identity and identity management and their relationships. Aug 1, ISO/IEC consists of the following parts, under the general title Information technology — Security techniques — A framework for identity.
|Published (Last):||10 August 2004|
|PDF File Size:||14.72 Mb|
|ePub File Size:||11.85 Mb|
|Price:||Free* [*Free Regsitration Required]|
Applicable to entities involved in specifying, procuring, designing, testing, maintaining, administering and 247660 ICT systems that process PII. This standard is supposed to define key terms for identity management and specify core concepts in identity and identity management.
Specifies the structure and data elements of Authentication Context for Biometrics ACBio 2476, which checks the validity of biometric verification process results . Addresses the management needs for ensuring the security of applications  and presents an overview of application security through the introduction of definitions, concepts, principles and processes .
ISO/IEC JTC 1/SC 27
Notify me of new comments via email. Defines a privacy architecture framework that: By continuing to use this website, you agree to their use.
Specifies encryption systems for the purpose of data confidentiality . Introduction and general model.
ISO/IEC /FDAmd 1 – Additional terminology and concepts
This page was last edited on 6 Marchat Specifies the requirements for establishing, implementing, monitoring, and maintaining documented a documented ISMS within an organization. The section on concepts is jso anything, even more problematic. Email required Address never made public.
Doug Newdick’s Oso The discourse between business and technology. From Wikipedia, the free encyclopedia. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as: Provides a privacy framework that: The discussion of concepts seems very specific.
Identity Standards: ISO | Doug Newdick’s Blog
Describes the concepts and principles of ICT readiness for business continuity and the method and framework needed to identify aspects in which to improve it. Notify me of new posts via email. Hi Doug, funny that I should come across your blog first when looking into advice onto adhering to this standard.
Information technology – Security techniques – A framework for identity management – Part 2: Fill in your details below or click an icon to log in: They redefine commonly used terms in the industry authentication is redefined to mean a form of verification.
The concepts slip from being descriptive this is what the concept means to being normative this is how a system should behave. Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems. Synonyms are given for terms that are clearly incorrect e. Hi Doug, I was wondering whether you ever got around to sharing other standards and resources that do a better job of describing the concepts and terminology around identity.
In many cases they use terms that are just as unclear as the one they are trying to define e. SC 27 engages in active liaison and collaboration with appropriate bodies to ensure the proper development and application of SC 27 standards and technical reports in relevant areas.
They are inconsistent in their use of other terms defined in the standard. Provides a framework for the secure and reliable management of identities by: The focus of each working group is described in the group’s terms of reference. You are commenting using your WordPress.