IEC TR 62351-13 Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications - Edition 1.0
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35.040
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- Картотека зарубежных и международных стандартов
Ссылается на
- В списке элементов: 18
- IEEE PC37.238/D21.3 Draft Standard Profile for Use of IEEE 1588 Precision Time Protocol in Power System ApplicationsСпроектируйте стандартный профиль для использования протокола времени точности IEEE 1588 года в приложениях энергосистемы
Карточка документа - IEEE 2030.6 Guide for the Benefit Evaluation of Electric Power Grid Customer Demand ResponseГид для оценки преимущества ответа потребительского спроса сетки электроэнергии
Карточка документа - IEC TR 62351-12 Power systems management and associated information exchange - Data and communications security - Part 12: Resilience and security recommendations for power systems with distributed energy resources (DER) cyber-physical systems - Edition 1.0Управление системами питания и связанный обмен информацией - Данные и коммуникационная безопасность - Часть 12: Упругость и рекомендации безопасности для систем питания с распределенными энергетическими ресурсами (DER) киберфизические системы - Издание 1.0
Карточка документа - ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth EditionИнформационные технологии - методы Безопасности - системы управления Информационной безопасностью - Обзор и словарь - Четвертый Выпуск
Карточка документа - IEEE 1815.1 Exchanging Information Between Networks Implementing IEC 61850 and IEEE Std 1815 [Distributed Network Protocol (DNP3)] - Incorporates Corrigendum: 2016При обмене информации между сетями, осуществляющими IEC 61850 и станд. IEEE 1815 [распределенный сетевой протокол (DNP3)] - включает исправление: 2016
Карточка документа - ISO ISO/IEC/IEEE 29119-4 Software and systems engineering - Software testing - Part 4: Test techniques - First EditionПрограммное обеспечение и системное проектирование - тестирование программного обеспечения - Часть 4: Методы испытания - Первый Выпуск
Карточка документа - IEC 62541-3 OPC unified architecture – Part 3: Address Space Model - Edition 2.0Унифицированная архитектура OPC – Часть 3: Модель Адресного пространства - Выпуск 2.0
Карточка документа - IEC 62056-1-0 Electricity metering data exchange – The DLMS/COSEM suite – Part 1-0: Smart metering standardisation framework - Edition 1.0Обмен данными измерения электричества – комплект DLMS/COSEM – Часть 1-0: Умная платформа стандартизации измерения - Выпуск 1.0
Карточка документа - IEC 62443-3-3 CORR 1 Industrial communication networks – Network and system security Part 3-3: System security requirements and security levels - Edition 1.0Промышленные сети связи – Сеть и Часть 3-3 безопасности системы: требования безопасности системы и уровни безопасности - Выпуск 1.0
Карточка документа - ISO ISO/IEC TR 27019 Information technology - Security techniques - Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry - First EditionИнформационные технологии - методы Безопасности - инструкции по управлению информационной безопасностью, основанные на ISO/IEC 27002 для систем управления процессом, определенных для энергетической отрасли утилиты - Первый Выпуск
Карточка документа - ISO 15118-1 Road vehicles - Vehicle to grid communication interface - Part 1: General information and use-case definition - First EditionДорожные транспортные средства - Транспортное средство к коммуникационному интерфейсу сетки - Часть 1: Общая информация и определение заболевания использования - Первый Выпуск
Карточка документа - IETF RFC 6347 Datagram Transport Layer Security Version 1.2Дейтаграммная версия 1.2 безопасности транспортного уровня
Карточка документа - IEC 62443-2-1 Industrial communication networks – Network and system security – Part 2-1: Establishing an industrial automation and control system security program - Edition 1.0Промышленные сети связи – Сеть и безопасность системы – Часть 2-1: Установление автоматизации производства и программы обеспечения безопасности системы управления - Выпуск 1.0
На основе IEC 62443-2-1 разработан ГОСТ Р МЭК 62443-2-1-2015 (IDT)ГОСТ Р МЭК 62443-2-1-2015 (IDT) - NEMA SG-AMI 1 Requirements for Smart Meter UpgradeabilityТребования для умной возможности модернизации метра
Карточка документа - IETF RFC 5246 The Transport Layer Security (TLS) Protocol Version 1.2Версия 1.2 протокола Transport Layer Security (TLS)
Карточка документа - IEC PAS 62559 IntelliGrid Methodology for Developing Requirements for Energy Systems - Edition 1.0Методология IntelliGrid для развития требований для энергетических систем - издание 1.0
Карточка документа - IEC 60870-6-2 Telecontrol Equipment and Systems - Part 6: Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations - Section 2: Use of Basic Standards (OSI Layers 1- 4) - Edition 1.0Оборудование телеуправления и системы - часть 6: протоколы телеуправления, совместимые со стандартами ISO и ITU-T рекомендации - разделяют 2: использование основных норм (уровни модели OSI 1 - 4) - выпуск 1.0
Карточка документа - ISO ISO/IEC 7498-1 Information Technology - Open Systems Interconnection - Basic Reference Model: the Basic Model - Second Edition; Corrected and reprlnted : 6/15/1996Информационные технологии - Взаимодействие открытых систем - Основная Эталонная модель: Базовая модель - Второй Выпуск; Исправленный и переизданный: 15.06.1996
На основе ISO ISO/IEC 7498-1 разработан ГОСТ Р ИСО/МЭК 7498-1-99 (IDT)ГОСТ Р ИСО/МЭК 7498-1-99 (IDT)



