Cybersecurity

Available (269)

Showing 25 - 36 per page



Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements (Adopted ISO/IEC 27009:2020, second edition, 2020-04)

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).

For brevity, this Standard will be referred to as CSA ISO/IEC 27009 throughout.

This Standard supersedes CAN/CSA-ISO/IEC 27009:18 (adopted ISO/IEC 27009:2016). At the time of publication, ISO/IEC 27009:2020 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC.

This Standard has been formally approved, without modification, by the Technical Committee and has been developed in compliance with Standards Council of Canada requirements for National Standards of Canada. It has been published as a National Standard of Canada by CSA Group.

CSA ISO/IEC 27009:20

Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements (Adopted ISO/IEC 27009:2020, second edition, 2020-04)

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).

For brevity, this Standard will be referred to as CSA ISO/IEC 27009 throughout.

This Standard supersedes CAN/CSA-ISO/IEC 27009:18 (adopted ISO/IEC 27009:2016). At the time of publication, ISO/IEC 27009:2020 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC.

This Standard has been formally approved, without modification, by the Technical Committee and has been developed in compliance with Standards Council of Canada requirements for National Standards of Canada. It has been published as a National Standard of Canada by CSA Group.

CSA ISO/IEC 27009:20

SmileCity Report platform – a secure app through which citizens can showcase affective information on a city event

Body

Dear community, the M-Sec Project is currently implementing 5 pilots to test, validate and showcase the impact of its cybersecurity solution. Learn more about M-Sec’s Use Case 4 to better understand how this Use Case is being implemented in the Japanese city of Fujisawa.

Groups

Going for a walk at a nearby park and want to know more about the environment that surrounds you?

Body

Dear community, the M-Sec Project is currently implementing 5 pilots to test, validate and showcase the impact of its cybersecurity solution. Learn more about M-Sec’s Use Case 1 to better understand how this Use Case is being implemented in the Spanish city of Santander.

Read the blogpost here

Groups

Standard Guide for Cybersecurity and Cyberattack Mitigation

This guide addresses the company or government organizational need to mitigate the likelihood of cyberattacks and reduce the extent of potential cyberattacks, which can leave sensitive personal data, corporate information, and critical infrastructure vulnerable to attackers.

These recommendations are meant to serve as a guideline for corporate and government organizations to adopt for the protection of sensitive personal information and corporate data against hackers.

ASTM F3286 - 17

M-Sec Cookbook – a practical guide for IoT developers

Body

The main focus of M-Sec’s Cookbook is to introduce the M-Sec IoT security framework that has been developed by the European and Japanese consortium researchers for the past two years. Therefore, it presents techniques, methods, and design and operating principles of the M-Sec solution that those researchers believe will help other IoT developers to minimize the risk of suffering critical vulnerabilities in a wide range of IoT devices. In other words, the M-Sec Cookbook is a practical guide for all IoT developers to develop reliable and secure applications for the smart city context.

The Cookbook provides an introduction to the M-Sec components from five different aspects – IoT security, cloud and data level security, P2P level security and blockchain, application-level security, and overall end-to-end security – with their definition and ulterior implementation, thus serving as a practical guide for any IoT developer who wishes to implement the M-Sec solution in order to address security concerns and risks identified in a smart city context.

Want to know more about how to implement the M-Sec solution?
Download the Cookbook: https://www.msecproject.eu/wp-content/uploads/2020/12/M-Sec_Cookbook_final-version.pdf

Groups

CACAO Security Playbooks Version 1.0

Defining the schema and taxonomy for collaborative automated course of action operations (CACAO) security playbooks and how these playbooks can be created, documented, and shared in a structured and standardized way across organizational boundaries and technological solutions.

 

 

Security Playbooks V1.0

M-Sec citizens and stakeholders consultation

Body

M-Sec is an EU-Japan collaborative Project with the main goal of developing an innovative solution that ensures a more secure data transfer between stakeholders when using IoT devices and applications in hyper-connected smart cities.

In the scope of this research, the project is now conducting an online survey to all EU and Japanese citizens and stakeholders, to collect feedback on individuals use of IoT devices and applications, and their understanding of data protection regulation.

Your opinion is, thus, very much appreciated and will contribute to a better understanding of the IoT ecosystem in which M-Sec is expected to operate.

Filling in this survey will not take you more than 1 minute.
Access the survey: https://forms.gle/GhhDqGTUPPyfX7Fh6

Thank you so much for your collaboration,
The M-Sec Team

Groups

M-Sec White Paper: How can the M-Sec solution help solve the privacy and security challenges faced by the IoT market?

Body

The M-Sec Project, an EU and Japanese collaboration, released a White Paper that acts as a guide to inform readers about the main IoT security issues faced nowadays and proposes concrete solutions to these problems.

Tell us your opinion! Read the Report:
https://www.msecproject.eu/wp-content/uploads/2020/10/M-Sec_WhitePaper_v5_CLEAN.pdf

Groups

Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements

The present document specifies a conformance assessment methodology for consumer IoT devices, their relation to associated services and corresponding relevant processes against ETSI TS 103 645 [1] / ETSI EN 303 645,  Draft ETSI addressing the mandatory and recommended provisions as well as conditions and complements ETSI TS 103 645 / ETSI EN 303 645 by defining test cases and assessment criteria for each provision.

ETSI TS 103 701 V 0.0.5