{"id":450661,"date":"2024-10-20T09:13:02","date_gmt":"2024-10-20T09:13:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-223882023-2024\/"},"modified":"2024-10-26T17:10:36","modified_gmt":"2024-10-26T17:10:36","slug":"bs-iso-223882023-2024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-223882023-2024\/","title":{"rendered":"BS ISO 22388:2023 2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Document security principles 4.1 User\u2019s category <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Document stages <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.3 Elements to be protected 4.4 Considerations for security manufacturing <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5 Document security design 5.1 General 5.2 Risk assessment for document security 5.2.1 Estimation of risk <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2.2 Four attack enablers of document fraud 5.2.3 Types of threat <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2.4 Document-specific risk factors 5.3 Determination of document classes 5.4 Security features 5.4.1 Physical security features \u2014 Selection and design <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4.2 Digital security features <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.5 Developing a risk rating <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.6 Security evaluation <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.7 Document risk mitigation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Annex A (informative) Risk assessment for security documents <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex B (informative) Rating system for security controls <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex C (informative) Rating criteria for security features <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex D (informative) Categorization of security features by authentication level and associated method <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex E (informative) Glossary of document security technologies <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Security and resilience. Authenticity, integrity and trust for products and documents. Guidelines for securing physical documents<\/b><\/p>\n |