ISO 24760 PDF


ISO/IEC /FDAmd 1. Additional terminology and concepts. General information. Status: Deleted. Edition: 1. Number of pages: Technical. ISO/IEC •defines terms for identity management, and •specifies core concepts of identity and identity management and their relationships. Aug 1, ISO/IEC consists of the following parts, under the general title Information technology — Security techniques — A framework for identity.

Author: Tagal Tygozil
Country: Nigeria
Language: English (Spanish)
Genre: Personal Growth
Published (Last): 24 November 2012
Pages: 152
PDF File Size: 19.91 Mb
ePub File Size: 4.53 Mb
ISBN: 464-1-52309-183-3
Downloads: 5957
Price: Free* [*Free Regsitration Required]
Uploader: Dokus

Provides guidelines for the implementation of systems for the management of identity information and specifies requirements for the implementation and operation of a framework for identity management.

Specifies six methods for authenticated encryption with the security objectives of: Specifies the subjects to be addressed during the security evaluation of a biometric system [23].

The discussion of concepts seems very specific. Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity.

These were among the reasons that a nmber of key countries voted against this standard. By using this site, you agree to the Terms of Use and Privacy Policy. Latest Tweets Nice article on practical concerns with modelling. Provides guidance for the handling of digital evidence that could be of evidential value [27].


You are commenting using your WordPress. The concepts 2460 from being descriptive this is what the concept means to being normative this is how a system should behave.

Identity Standards: ISO | Doug Newdick’s Blog

Reference architecture and requirements. Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence.

Provides a privacy framework that: Information technology – Security techniques – A iao for identity management – Part 2: Describes the concepts and principles of ICT readiness for business continuity and the method and framework needed to identify aspects in which to improve it. It seems to favour particular implementations and approaches to identity instead of being entirely general. Information technology — Security techniques — A framework for identity management — Part 1: The definitions are mostly unclear and imprecise: Notify me of new posts via email.

Information technology — Security techniques — Information security management systems — Requirements. Shane Day July 17, at 4: The focus of each working group is described in the group’s terms of reference. Information technology — Security techniques — Code of practice for information security controls. Describes the overview and vocabulary of ISMS [15].

To find out more, including how to sio cookies, see here: They are inconsistent in their use of other terms defined in the standard.


Email required Address never made public. Provides a structured and planned approach to: There are other ones out there which do 27460 better job of describing the key concepts of identity and identity management. This standard is supposed to define key terms for identity management and specify core concepts in identity and identity management. Views Read Edit View history.

ISO/IEC /FDAmd 1 – Additional terminology and concepts

My view is that it should be avoided. From Wikipedia, the free encyclopedia. It is entirely ICT focused though at other times it claims otherwise which is unhelpful in the context of a general framework for identity. Specifies encryption systems for the purpose of data confidentiality [20].


By continuing to use this website, you agree to their use. Notify me of new comments via email.

Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems.