{"id":439865,"date":"2024-10-20T08:11:34","date_gmt":"2024-10-20T08:11:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-ts-235262023\/"},"modified":"2024-10-26T15:19:37","modified_gmt":"2024-10-26T15:19:37","slug":"bsi-pd-iso-ts-235262023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-ts-235262023\/","title":{"rendered":"BSI PD ISO\/TS 23526:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Considerations on security framework for digital 4.1 General <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Security considerations for processing digital currencies 4.3 Variations of security frameworks 4.3.1 Non-fiat digital currency (digital asset) security framework 4.3.2 Creating a national digital currency with an anonymity security framework <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.3.3 Secure digital cash as digital currency with consumer identity security framework 4.4 Overview of security frameworks 4.4.1 General 4.4.2 Standards as a basis for security frameworks 5 The emergence of currency in digital formats 5.1 Digital cash representing money as a basis for financial usage with security <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 Cryptocurrencies as a digital entity for financial usage <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3 Cryptocurrencies and the digital currency market challenges 5.4 Cryptocurrencies and financial market formats <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.5 Cryptocurrencies and banking regulation \u2013 stablecoin example <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.6 Security criteria representing security aspects 5.6.1 Security objects 5.6.2 Key management 5.6.3 Hiding and steganography techniques 5.6.4 Digital representation 5.6.5 Digital model <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.6.6 Security countermeasures 5.6.7 Legal and regulatory requirements 5.6.8 Trust 5.6.9 Chaining security processes 5.6.10 Security framework implementation 5.6.11 Platform independence 5.6.12 Existing good practices 5.6.13 Digital interfaces <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6 Critical areas for security to establish trust, acceptance and risk 6.1 Digital wallets <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.2 Specific security considerations 6.3 Digital currency financial security framework considerations 7 Fraud and threat considerations <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Security aspects for digital currencies<\/b><\/p>\n |