The purpose of this SAE Aerospace Information Report (AIR) is to provide guidance for aircraft engine and propeller systems (hereafter referred to as propulsion systems) certification for cybersecurity. Compliance for cybersecurity requires that the engine control, propeller...
1.1 This specification covers a nonpowered trailer intended to be pulled behind a bicycle in order to transport one or two children with an accessory load of a maximum weight of 45.4 kg (100 lb). It includes test methods for confirming that this specification is satisfied. 1.2 The values stated in...
This document provides the overview of information security management systems (ISMS). It also provides terms and definitions commonly used in the ISMS family of standards. This document is applicable to all types and sizes of organization (e.g. commercial enterprises,...
This Recommended Standard specifies the manner in which the Internet Engineering Task Force's IP Security Protocol (IPsec) should be implemented and used for CCSDS missions. PURPOSE This CCSDS Recommended Standard provides the basis for Network Layer security for space missions...
This SAE Information Report, SAE J2931, establishes the requirements for the powerline carrier (PLC) digital communication between plug-in electric vehicles (PEVs), the electric vehicle supply equipment (EVSE) and the utility or service provider, energy services interface (ESI), advanced...
5.1 The original CIE color scales based on tristimulus values X, Y, Z and chromaticity coordinates x, y are not uniform visually. Each subsequent color scale based on CIE values has had weighting factors applied to provide some degree of uniformity so that color differences in various regions of...
This document provides explanation and guidance on ISO/IEC 27001:2013.
This International Standard specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1 and ISO/IEC 27001. It is primarily...
5.1 These test methods are intended to establish a measure of resistance for sliding door assemblies subjected to attacks (other than impacting glazing materials) by unskilled or opportunistic burglars. Resistance to higher levels of force generated by skilled burglary attack requires methods, such...
1.1 These test methods cover the ability of window assemblies of various types to restrain, delay, or frustrate forced entry. 1.2 For purposes of these test methods, window assemblies are defined as described in 1.2.1 - 1.2.5 and as shown in Fig. 1. Window assemblies with a combination of operable...
1.1 This practice presents a procedure for calculating and interpreting AHP scores of a project's/product's/
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and...
046000-000000-000000
IEC TR 62351-90-3:2021, which is a technical report, provides guidelines for efficiently handling both IT and OT data in terms of their monitoring, classification and correlations on them to deduce any possible useful outcomes about the state of the power system. The convergence of...
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: - extended security functional components to SFR Classes in ISO/IEC 15408-2; -...
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and...
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with...