{"id":1664,"date":"2025-07-22T20:39:57","date_gmt":"2025-07-22T16:39:57","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=1664"},"modified":"2025-07-22T20:40:57","modified_gmt":"2025-07-22T16:40:57","slug":"iso-iec-24760-12019","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/az\/iso-iec-24760-12019\/","title":{"rendered":"ISO\/IEC 24760-1:2019"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1664\" class=\"elementor elementor-1664\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3eb088fa e-flex e-con-boxed e-con e-parent\" data-id=\"3eb088fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-140f3a3a e-flex e-con-boxed e-con e-parent\" data-id=\"140f3a3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3611e008 elementor-widget elementor-widget-spacer\" data-id=\"3611e008\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-27001e2 e-flex e-con-boxed e-con e-parent\" data-id=\"27001e2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ba6e650 e-flex e-con-boxed e-con e-parent\" data-id=\"6ba6e650\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-364ba110 elementor-widget elementor-widget-text-editor\" data-id=\"364ba110\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"stdTitle\"><span class=\"h4 fw-normal d-block mb-2\">\u0130T T\u0259hl\u00fck\u0259sizliyi v\u0259 M\u0259xfilik \u2014 \u015e\u0259xsiyy\u0259tin idar\u0259 edilm\u0259si \u00fc\u00e7\u00fcn \u00e7\u0259r\u00e7iv\u0259<\/span><span class=\"h4 fw-semibold d-block\">1-ci hiss\u0259: Terminologiya v\u0259 anlay\u0131\u015flar<\/span><\/p><div class=\"d-flex justify-content-between align-items-center\"><h2>Abstract<\/h2><\/div><div><p>\u00a0<\/p><p>This document defines terms for identity management, and specifies core concepts of identity and identity management and their relationships.<\/p><p>It is applicable to any information system that processes identity information.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bcdb1cf e-flex e-con-boxed e-con e-parent\" data-id=\"5bcdb1cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cb7e58 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"1cb7e58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\r\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/az\/iso-iec-27701\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">\u018fvv\u0259lki<\/span><span class=\"post-navigation__prev--title\">ISO\/IEC 27701:<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\r\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/az\/iso-27001-certification\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Sonrak\u0131<\/span><span class=\"post-navigation__next--title\">ISO 27001 Sertifikat\u0131<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Sonrak\u0131<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 24760-1:2019 IT Security and Privacy \u2014 A framework for identity managementPart 1: Terminology and concepts Abstract \u00a0 This document defines terms for identity management, and specifies core concepts of identity and identity management and their relationships. It is applicable to any information system that processes identity information.<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1664","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages\/1664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/comments?post=1664"}],"version-history":[{"count":0,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages\/1664\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/media?parent=1664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}