ISO 24760 PDF

ISO/IEC /FDAmd 1. Additional terminology and concepts. General information. Status: Deleted. Edition: 1. Number of pages: Technical. ISO/IEC •defines terms for identity management, and •specifies core concepts of identity and identity management and their relationships. Aug 1, ISO/IEC consists of the following parts, under the general title Information technology — Security techniques — A framework for identity.

Author: Mumuro Zolozahn
Country: Venezuela
Language: English (Spanish)
Genre: Education
Published (Last): 10 August 2004
Pages: 26
PDF File Size: 14.72 Mb
ePub File Size: 11.85 Mb
ISBN: 981-8-30060-593-5
Downloads: 22466
Price: Free* [*Free Regsitration Required]
Uploader: Daigis

By using this site, you agree to the Terms of Use and Privacy Policy.

Applicable to entities involved in specifying, procuring, designing, testing, maintaining, administering and 247660 ICT systems that process PII. This standard is supposed to define key terms for identity management and specify core concepts in identity and identity management.

Specifies the structure and data elements of Authentication Context for Biometrics ACBio 2476, which checks the validity of biometric verification process results [30]. Addresses the management needs for ensuring the security of applications [5] and presents an overview of application security through the introduction of definitions, concepts, principles and processes [25].


Notify me of new comments via email. Defines a privacy architecture framework that: By continuing to use this website, you agree to their use.

This site uses cookies. Provides a structured and planned approach to: It is entirely ICT focused though at other times it claims otherwise which is unhelpful in the context of a general framework for identity. The definitions are mostly unclear and imprecise: My view is that it should be avoided. Isoo technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence. To find out ido, including how to control cookies, see here: Information technology — Security techniques — Application security — Part 1: Information technology — Security techniques — Information security management systems — Overview and vocabulary.


Specifies encryption systems for the purpose of data confidentiality [20]. Introduction and general model.

ISO/IEC /FDAmd 1 – Additional terminology and concepts

This page was last edited on 6 Marchat Specifies the requirements for establishing, implementing, monitoring, and maintaining documented a documented ISMS within an organization. The section on concepts is jso anything, even more problematic. Email required Address never made public.

Doug Newdick’s Oso The discourse between business and technology. From Wikipedia, the free encyclopedia. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as: Provides a privacy framework that: The discussion of concepts seems very specific.

Identity Standards: ISO | Doug Newdick’s Blog

Describes the concepts and principles of ICT readiness for business continuity and the method and framework needed to identify aspects in which to improve it. Notify me of new posts via email. Hi Doug, funny that I should come across your blog first when looking into advice onto adhering to this standard.

Information technology – Security techniques – A framework for identity management – Part 2: Fill in your details below or click an icon to log in: They redefine commonly used terms in the industry authentication is redefined to mean a form of verification.

  AMC S412 PDF

The concepts slip from being descriptive this is what the concept means to being normative this is how a system should behave. Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems. Synonyms are given for terms that are clearly incorrect e. Hi Doug, I was wondering whether you ever got around to sharing other standards and resources that do a better job of describing the concepts and terminology around identity.

In many cases they use terms that are just as unclear as the one they are trying to define e. SC 27 engages in active liaison and collaboration with appropriate bodies to ensure the proper development and application of SC 27 standards and technical reports in relevant areas.

They are inconsistent in their use of other terms defined in the standard. Provides a framework for the secure and reliable management of identities by: The focus of each working group is described in the group’s terms of reference. You are commenting using your WordPress.