{"id":400819,"date":"2024-10-20T04:52:39","date_gmt":"2024-10-20T04:52:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2140-2-2021\/"},"modified":"2024-10-26T08:40:13","modified_gmt":"2024-10-26T08:40:13","slug":"ieee-2140-2-2021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2140-2-2021\/","title":{"rendered":"IEEE 2140.2-2021"},"content":{"rendered":"
New IEEE Standard – Active. In this standard requirements are defined for multiple aspects of security management for customer cryptographic assets on cryptocurrency exchanges, such as user identification using multi-factor authentication, prioritized protection of customer assets under unforeseen circumstances, and professional ethics of operation for cryptocurrency exchange platforms.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2140.2\u2122-2021 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Purpose <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1.3\u2002Word usage 2.\u2002Definitions, acronyms, and abbreviations 2.1\u2002Definitions 2.2\u2002Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3.\u2002User authentication management 3.1\u2002General 3.2\u2002Registration authentication 3.3\u2002Real-name authentication 3.4\u2002Security authentication 4.\u2002Infrastructure security regulations 4.1\u2002General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.2\u2002Security management of the physical area where the infrastructure is located 4.3\u2002Detection and protection of infrastructure security <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.4\u2002Personnel security education 4.5\u2002Security response specifications 5.\u2002Sustainability management 5.1\u2002General 5.2\u2002System operation management <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.3\u2002System upgrade management 5.4\u2002Security logs <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.\u2002Professional ethics of operation 6.1\u2002General 6.2\u2002Compliance and order 6.3\u2002Independent and objective 6.4\u2002Integrity responsibility <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.5\u2002Market reputation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Security Management for Customer Cryptographic Assets on Cryptocurrency Exchanges<\/b><\/p>\n |