Standard

Available (2726)

Showing 1021 - 1032 per page



IEC TR 63283-3 ED1Industrial-process measurement, control and automation - Smart Manufacturing - Part 3: Challenges for Cybersecurity

The document addresses roles of IIoT platforms and edge computing in the context of architecture-related transition from classical automation pyramid to automation networks, particularly related to security issues.

IEC TR 63283-3 ED1

ISO/IEC CD 30149 (2022)IoT Trustworthiness principles

This document provides principles for IoT trustworthiness based on ISO/IEC 30141 - IoT Reference Architecture. The current content and scope is based on the premise that Internet of Things is an application and can use a software development lifecycle as a means to address trust in IoT.

ISO/IEC CD 30149 (2022)

ISO/IEC 27032:2012Information technology -- Security techniques -- Guidelines for cybersecurity

ISO/IEC 27032:2012 provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular: information security, network security, internet security, and critical information infrastructure protection (CIIP). It covers the baseline security practices for stakeholders in the Cyberspace. This International Standard provides: an overview of Cybersecurity, an explanation of the relationship between Cybersecurity and other types of security, a definition of stakeholders and a description of their roles in Cybersecurity, guidance for addressing common Cybersecurity issues, and a framework to enable stakeholders to collaborate on resolving Cybersecurity issues.

ISO/IEC 27032:2012

ISO/IEC TS 27570:2021Privacy protection -- Privacy guidelines for smart cities

The document takes a multiple agency as well as a citizen-centric viewpoint. It provides guidance on: smart city ecosystem privacy protection; how standards can be used at a global level and at an organizational level for the benefit of citizens; and processes for smart city ecosystem privacy protection.

ISO/IEC TS 27570:2021

ISO/IEC TR 27550:2019Information technology -- Security techniques -- Privacy engineering for system life cycle processes

This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes: the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management); and privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, and architecture design.

ISO/IEC TR 27550:2019

ISO/IEC TS 27110:2021Information technology, cybersecurity and privacy protection -- Cybersecurity framework development guidelines

This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations' type, size or nature.

ISO/IEC TS 27110:2021

ETSI TS 103 701CYBER; Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements

The present document specifies a conformance assessment methodology for consumer IoT devices, their relation to associated services and corresponding relevant processes against ETSI TS 103 645 / ETSI EN 303 645, addressing the mandatory and recommended provisions as well as conditions and complements ETSI TS 103 645 / ETSI EN 303 645 by defining test cases and assessment criteria for each provision.

ETSI TS 103 701

IEC TS 62443-1-1:2009Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models

IEC/TS 62443-1-1:2009(E) is a technical specification which defines the terminology, concepts and models for Industrial Automation and Control Systems (IACS) security. It establishes the basis for the remaining standards in the IEC 62443 series.

IEC TS 62443-1-1:2009

IEEE 802.1X-2020IEEE Standard for Local and Metropolitan Area Networks--Port-Based Network Access Control

Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to secure communication between authenticated and authorized devices. This standard specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE(TM) MAC Security.

IEEE 802.1X-2020

IEEE 802.1AE-2018IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security

The document describes how all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802 LANs to communicate is specified in this standard. MAC security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data origin authenticity.

IEEE 802.1AE-2018

IEEE 7005-2021IEEE Standard for Transparent Employer Data Governance

Specific methodologies to help employers in accessing, collecting, storing, utilizing, sharing, and destroying employee data are described in this standard. Specific metrics and conformance criteria regarding these types of uses from trusted global partners and how third parties and employers can meet them are provided in this standard. Certification processes, success criteria, and execution procedures are not within the scope of this standard.

IEEE 7005-2021

OMA-RD-GwMO-V1_1-20170725-AGwMO Requirements

This document lists the complete set of requirements for the OMA DM Gateway Management Object Enabler v1.1. It includes all the requirement of the OMA DM GatewayMO v1.0. It mainly focuses on requirements to enable a DM Server to manage devices that are not directly accessible to the OMADM Server (for example, because the devices are deployed behind a firewall or because the devices do not support the OMA DM protocol). This document also provides requirements
for management of devices in a Machine to Machine (M2M) ecosystem (for example, fanning out DM commands from a DM Server to multiple End Devices and aggregating responses from multiple End Devices so that a consolidated response is sent back to the DM Server).

OMA-RD-GwMO-V1_1-20170725-A