PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>BS ISO/IEC 19989-2:2020 Information security. Criteria and methodology for security evaluation of biometric systems Biometric recognition performance
Sponsored link
immediate downloadReleased: 2020-10-07
BS ISO/IEC 19989-2:2020 Information security. Criteria and methodology for security evaluation of biometric systems Biometric recognition performance

BS ISO/IEC 19989-2:2020

Information security. Criteria and methodology for security evaluation of biometric systems Biometric recognition performance

Format
Availability
Price and currency
English Secure PDF
Immediate download
292.80 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
29.28 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
87.84 EUR
English Hardcopy
In stock
292.80 EUR
Standard number:BS ISO/IEC 19989-2:2020
Pages:42
Released:2020-10-07
ISBN:978 0 539 03441 7
Status:Standard
BS ISO/IEC 19989-2:2020 - Information Security Standard

BS ISO/IEC 19989-2:2020: Elevate Your Biometric Security Standards

In the rapidly evolving world of technology, ensuring the security of biometric systems is paramount. The BS ISO/IEC 19989-2:2020 standard is your comprehensive guide to understanding and implementing robust security measures for biometric recognition systems. Released on October 7, 2020, this standard is a critical resource for organizations aiming to enhance their information security frameworks.

Overview of BS ISO/IEC 19989-2:2020

This standard, officially titled Information Security. Criteria and Methodology for Security Evaluation of Biometric Systems Biometric Recognition Performance, provides a detailed methodology for evaluating the security of biometric systems. With a focus on biometric recognition performance, it offers a structured approach to assessing the effectiveness and reliability of these systems in safeguarding sensitive information.

Key Features

  • Standard Number: BS ISO/IEC 19989-2:2020
  • Pages: 42
  • Release Date: October 7, 2020
  • ISBN: 978 0 539 03441 7
  • Status: Standard

Why Choose BS ISO/IEC 19989-2:2020?

Biometric systems are increasingly being integrated into various sectors, from banking and healthcare to government and personal devices. As these systems become more prevalent, the need for rigorous security evaluation becomes critical. The BS ISO/IEC 19989-2:2020 standard provides a framework that helps organizations:

  • Enhance Security: By following the criteria and methodologies outlined in this standard, organizations can significantly improve the security posture of their biometric systems.
  • Ensure Compliance: Adhering to international standards is crucial for compliance with regulatory requirements and for gaining trust from stakeholders.
  • Improve Performance: The standard not only focuses on security but also on the performance of biometric recognition systems, ensuring they operate efficiently and effectively.

Comprehensive Evaluation Criteria

The BS ISO/IEC 19989-2:2020 standard provides a comprehensive set of criteria for evaluating the security of biometric systems. These criteria are designed to assess various aspects of biometric recognition performance, including:

  • Accuracy: Ensuring that the system correctly identifies or verifies individuals.
  • Reliability: Evaluating the system's ability to perform consistently under different conditions.
  • Resistance to Attacks: Assessing the system's robustness against potential security threats and vulnerabilities.

Methodology for Security Evaluation

The methodology outlined in the BS ISO/IEC 19989-2:2020 standard provides a step-by-step approach to conducting security evaluations of biometric systems. This methodology includes:

  • Risk Assessment: Identifying potential risks and vulnerabilities associated with the biometric system.
  • Testing and Validation: Conducting rigorous tests to validate the system's security measures and performance.
  • Continuous Monitoring: Implementing ongoing monitoring processes to ensure the system remains secure over time.

Who Should Use This Standard?

The BS ISO/IEC 19989-2:2020 standard is essential for a wide range of professionals and organizations, including:

  • Security Professionals: Individuals responsible for the security of biometric systems will find this standard invaluable for developing and implementing effective security strategies.
  • IT Managers: IT managers can use this standard to ensure their biometric systems meet international security standards and perform optimally.
  • Compliance Officers: Compliance officers can leverage this standard to ensure their organizations adhere to relevant regulations and standards.

Conclusion

In an era where data breaches and security threats are increasingly common, the BS ISO/IEC 19989-2:2020 standard offers a vital resource for organizations looking to secure their biometric systems. By providing a comprehensive framework for evaluating biometric recognition performance, this standard helps organizations enhance their security measures, ensure compliance, and improve system performance. Whether you are a security professional, IT manager, or compliance officer, the BS ISO/IEC 19989-2:2020 standard is an indispensable tool in your information security arsenal.

DESCRIPTION

BS ISO/IEC 19989-2:2020


This standard BS ISO/IEC 19989-2:2020 Information security. Criteria and methodology for security evaluation of biometric systems is classified in these ICS categories:
  • 35.030 IT Security

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series.

It provides requirements and recommendations to the developer and the evaluator for the supplementary activities on biometric recognition performance specified in ISO/IEC 19989-1.

The evaluation of presentation attack detection techniques is out of the scope of this document except for presentation from impostor attempts under the policy of the intended use following the TOE guidance documentation.