ISO 24760 PDF

ISO/IEC /FDAmd 1. Additional terminology and concepts. General information. Status: Deleted. Edition: 1. Number of pages: Technical. ISO/IEC •defines terms for identity management, and •specifies core concepts of identity and identity management and their relationships. Aug 1, ISO/IEC consists of the following parts, under the general title Information technology — Security techniques — A framework for identity.

Author: Kagagul Negul
Country: Dominican Republic
Language: English (Spanish)
Genre: Automotive
Published (Last): 10 February 2016
Pages: 441
PDF File Size: 13.37 Mb
ePub File Size: 3.92 Mb
ISBN: 448-7-77450-777-3
Downloads: 89533
Price: Free* [*Free Regsitration Required]
Uploader: Tausar

There are other ones out there which do a better job of describing the key concepts of identity and identity management.

You are commenting using your Twitter account. Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence. Identity management and privacy technologies. I couldn’t agree more with everything in it!

By continuing to use this website, you agree to their use. Enter your email address to subscribe to this blog and receive notifications of new posts by email. Notify me of new comments via ixo. The focus of each working group is described in the group’s terms of reference. Addresses the management needs for ensuring the security of applications [5] and presents an overview of application security through the introduction of definitions, concepts, principles and 27460 [25].

ISO/IEC /FDAmd 1 – Additional terminology and concepts

Specifies jso subjects to be addressed during the security evaluation of a biometric system [23]. You are commenting using your WordPress. From Wikipedia, the free encyclopedia. Describes the overview and vocabulary of ISMS [15].


Specifies the structure and data elements of Authentication Context for Biometrics ACBiowhich checks the validity of biometric verification process results [30].

Security controls isso services. Specifies encryption systems for the purpose of data confidentiality [20]. 2470 technology – Security techniques – A framework for identity management – Part izo They are inconsistent in their use of other terms defined in the standard. Synonyms are given for terms that are clearly incorrect e. Information technology — Security techniques — Code of practice for information security controls. Provides a privacy framework that: Leave a Reply Cancel reply Enter your comment here Create a free website or blog at WordPress.

Shane Day July 17, at 4: It seems to favour particular implementations and approaches to identity instead of being entirely general.


Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems.

This page was last edited on 6 Marchat My view is that it should be isp. Unfortunately it was adopted. The section on concepts is if anything, even more problematic.

This site uses cookies. Views Read Edit View history.

Information technology — Security techniques — Information security management systems — Overview and vocabulary. Provides a structured and planned approach to: SC 27 engages in active liaison and collaboration with appropriate bodies to ensure the proper development and application of SC 27 standards and technical reports in relevant areas.

They redefine commonly used terms in the industry authentication is redefined to mean a form of verification. Provides guidance for the handling of digital evidence that could be of evidential value [27]. Email required Address never made public.


Fill in your details below or click an icon to log in: Retrieved from ” https: Hi Doug, I was wondering whether you ever got around to sharing other standards and resources that do a better job of describing the concepts and terminology around identity.

Identity Standards: ISO | Doug Newdick’s Blog

Hi Doug, funny that I should come across your blog first when looking into advice onto adhering to this standard.

We are looking for an experienced Director of Finance for our head quarters in Noumea. The concepts slip from being descriptive this is what the concept means to being normative this is how a system should behave.

The definitions are mostly unclear and imprecise: Provides a framework for the secure and reliable management of identities by: Describes the concepts and principles of ICT readiness for business continuity and the method and framework needed to identify aspects in which to improve it.

It is entirely ICT focused though at other 224760 it claims otherwise which is unhelpful in the context of a general framework for identity. Information technology — Security techniques — A framework for identity management — Part 1: