Document Details |
|||||
| Name of Department/Committee : | LITD 17 | ||||
|---|---|---|---|---|---|
| Document Number : | LITD 17 ( 28863) | ||||
| Document Title [English] : | Information security cybersecurity and privacy protection General principles requirements and guidance for security evaluation of biometric systems First Revision | ||||
| Document Title [Hindi] : | सूचना सुरक्षा, साइबर सुरक्षा और गोपनीयता संरक्षण - बायोमेट्रिक प्रणालियों के सुरक्षा मूल्यांकन के लिए सामान्य सिद्धांत, आवश्यकताएं और मार्गदर्शन (पहला पुनरीक्षण) | ||||
| Document Type : | Revision | ||||
| Language : | English | ||||
| Priority : | 3 | ||||
| ICS Code : | ICS: 35.030 | ||||
| Date of Project Approval : | 08-08-2025 | ||||
| Standards to be Revised : |
|
||||
| Standards to be Superseded : | |||||
Classification Details |
|
| Group : | Software and systems |
| Sub Group : | IT software and systems |
| Sub Sub Group : | Information Systems Security |
| Aspects : | Others |
| Risk : | None |
| Certification : | None |
| Short Commom Man's Title : | |
| ITCHS Code : | |
| Ministry : |
|
| Sustainable development Goals : | |
| Degree of Equivalence : | Identical under single numbering |
| Identical/Equivalent Standards : | ISO/IEC 19792 :2025 |
| Organization Type: | ISO/IEC |
| Sl.No. | Synosis Points | |
| 1 | This document defines various areas that are important to consider during a security evaluation of a biometric system. These areas are represented by the following clauses: — Clause 5 explains the outline of security evaluation of biometric systems; — Clause 6 overviews the threats and vulnerabilities to biometric systems that should be considered for the evaluation; — Clause 7 describes the evaluation of biometric specific vulnerabilities related to recognition performance; — Clause 8 deals with the evaluation of biometric specific vulnerabilities related to presentation attack detection; — Clause 9 overviews the evaluation of privacy. This document is relevant to both evaluator and developer communities. It shows how a security evaluation of a biometric system is performed. It serves to inform developers of the requirements for biometric security evaluations to help them prepare for security evaluations. | |
Timeline Details |
|||||||
|
|
|||||||
|
|||||||
|
|||||||