ISO/IEC /FDAmd 1. Additional terminology and concepts. General information. Status: Deleted. Edition: 1. Number of pages: Technical. ISO/IEC •defines terms for identity management, and •specifies core concepts of identity and identity management and their relationships. Aug 1, ISO/IEC consists of the following parts, under the general title Information technology — Security techniques — A framework for identity.
|Published (Last):||2 December 2011|
|PDF File Size:||2.72 Mb|
|ePub File Size:||7.36 Mb|
|Price:||Free* [*Free Regsitration Required]|
Hi Doug, funny that I should come across your blog first when looking into advice onto adhering to this standard. It is entirely ICT focused though at other times it claims otherwise which is unhelpful in the context of a general framework for identity. From Wikipedia, the free encyclopedia.
Provides a privacy framework that: The only place I see is reference to it from other standards. The reasons for this are many: Fill in your details below or click an icon to log in: Reference architecture and requirements.
Security controls and services. Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity.
ISO/IEC JTC 1/SC 27
The concepts slip from being descriptive this is what the concept means to being normative this is how a system should behave. Latest Tweets Nice article on practical concerns with modelling.
By continuing to use this website, you izo to their use. Specifies six methods for authenticated encryption with the security objectives of: This standard is supposed to define key terms for identity management and specify core concepts in identity and identity management. Identity management and privacy technologies.
Describes the overview and vocabulary of ISMS . Defines a privacy architecture framework that: Isso redefine commonly used terms in the industry authentication is redefined to mean a form of verification. SC 27 engages in active liaison and collaboration with appropriate bodies to ensure the proper development and application of SC 27 standards and technical reports in relevant areas. The definitions are mostly unclear and imprecise: Information technology iiso Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence.
Notify me of new comments via email.
ISO/IEC JTC 1/SC 27 – Wikipedia
Information technology – Security techniques – A framework for identity management – Part 2: Doug Newdick’s Blog The discourse between business and technology. Retrieved from ” https: Notify me of new posts via email.
Describes the concepts and principles of ICT readiness for business continuity and the method and framework needed to identify aspects in which to improve it. Posted on February 10, at 9: The section on concepts is if anything, even more problematic.
Leave a Reply Cancel reply Enter your comment here Information technology — Security techniques — Information security management systems — Overview and vocabulary.
My view is that it should be avoided. Unfortunately it was adopted. Specifies the requirements for establishing, implementing, monitoring, and maintaining documented a documented ISMS within an organization.