{"id":450661,"date":"2024-10-20T09:13:02","date_gmt":"2024-10-20T09:13:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-223882023-2024\/"},"modified":"2024-10-26T17:10:36","modified_gmt":"2024-10-26T17:10:36","slug":"bs-iso-223882023-2024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-223882023-2024\/","title":{"rendered":"BS ISO 22388:2023 2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Document security principles
4.1 User\u2019s category <\/td>\n<\/tr>\n
11<\/td>\n4.2 Document stages <\/td>\n<\/tr>\n
12<\/td>\n4.3 Elements to be protected
4.4 Considerations for security manufacturing <\/td>\n<\/tr>\n
13<\/td>\n5 Document security design
5.1 General
5.2 Risk assessment for document security
5.2.1 Estimation of risk <\/td>\n<\/tr>\n
14<\/td>\n5.2.2 Four attack enablers of document fraud
5.2.3 Types of threat <\/td>\n<\/tr>\n
15<\/td>\n5.2.4 Document-specific risk factors
5.3 Determination of document classes
5.4 Security features
5.4.1 Physical security features \u2014 Selection and design <\/td>\n<\/tr>\n
16<\/td>\n5.4.2 Digital security features <\/td>\n<\/tr>\n
17<\/td>\n5.5 Developing a risk rating <\/td>\n<\/tr>\n
18<\/td>\n5.6 Security evaluation <\/td>\n<\/tr>\n
19<\/td>\n5.7 Document risk mitigation <\/td>\n<\/tr>\n
20<\/td>\nAnnex A (informative) Risk assessment for security documents <\/td>\n<\/tr>\n
27<\/td>\nAnnex B (informative) Rating system for security controls <\/td>\n<\/tr>\n
30<\/td>\nAnnex C (informative) Rating criteria for security features <\/td>\n<\/tr>\n
37<\/td>\nAnnex D (informative) Categorization of security features by authentication level and associated method <\/td>\n<\/tr>\n
38<\/td>\nAnnex E (informative) Glossary of document security technologies <\/td>\n<\/tr>\n
44<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Security and resilience. Authenticity, integrity and trust for products and documents. Guidelines for securing physical documents<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n46<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":450668,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-450661","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/450661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/450668"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=450661"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=450661"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=450661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}