Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 12 of 12 results

DS/ISO/IEC TR 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY Organization: DS
Date: 2013-08-30
Description: These are covered by the standard ¡§ISO/IEC 27011:2008 Information technology ¡V Security techniques ¡V Information security management guidelines for telecommunications organizations based on ISO/IEC 27002¡¨.
ISO - ISO/IEC TR 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY - FIRST EDITION Organization: ISO
Date: 2013-07-15
Description: These are covered by the standard "ISO/IEC 27011:2008 Information technology – Security techniques – Information security management guidelines for telecommunications organizations based on ISO/IEC 27002".
ISO - ISO/IEC DIS 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY Organization: ISO
Date: 2017-01-06
Description: This includes in particular the following: - central and distributed process control, monitoring and automation technology as well as information systems used for their operation, such as programming and parameterization devices; - digital controllers and automation components such as control and field devices or Programmable Logic Controllers (PLCs), including digital sensor and actuator elements; - all further supporting information systems used in the process control domain, e.g. for supplementary data visualization tasks and for controlling, monitoring, data archiving, historian logging, reporting and documentation purposes; - communication technology used in the process control domain, e.g. networks, telemetry, telecontrol applications and remote control technology; - Advanced Metering Infrastructure (AMI) components, e.g. smart meters; measurement devices, e.g. for emission values; - digital protection and safety systems, e.g. protection relays, safety PLCs, emergency governor mechanisms; - energy management systems, e.g. of distributed energy resources (DER), electric charging infrastructures, in private households, residential buildings or industrial customer installations; - distributed components of smart grid environments, e.g. in energy grids, in private households, residential buildings or industrial customer installations; - all software, firmware and applications installed on above mentioned systems, e.g.
SEPT - MED DEVICE CHECKLIST KIT - SOFTWARE ENGINEERING PROCESS TECHNOLOGY - MEDICAL DEVICE SOFTWARE CHECKLIST KIT - INCLUDES; ISO 13485: 2016, IEC 62304: 2015, UL 1998: 2004, ISO/IEC 90003: 2014, ISO 9001: 2015, FDA SW VAL STD CK/L, FDA OTS SW STD CHK/L, FDA MED DEV SW CK/L - SAVE 40% OVER BUYING INDIVIDUAL DOCUMENTS - REPLACES PRODUCT NUMBER 87: TO PURCHASE CALL 1-800-854-7179 USA/CANADA OR 303-397-7956 WORLDWIDE Organization: SEPT
Date: 2016-03-01
Description: Checklist for Guidance for Industry, FDA Reviewers and Compliance on Off-the Shelf Software Use in Medical Devices as amended by Guidance for Industry - Cyber security for Networked Medical Devices Containing Off-the Shelf (OTS) Software:2005  
SEPT - MED DEVICE CHECKLIST KIT* - *IN EDITABLE MICROSOFT WORD - SOFTWARE ENGINEERING PROCESS TECHNOLOGY - MEDICAL DEVICE SOFTWARE CHECKLIST KIT - INCLUDES; ISO 13485: 2016, IEC 62304: 2015, UL 1998: 2004, ISO/IEC 90003: 2014, ISO 9001: 2015, FDA SW VAL STD CK/L, FDA OTS SW STD CHK/L, FDA MED DEV SW CK/L - SAVE 40% OVER BUYING INDIVIDUAL DOCUMENTS - REPLACES PRODUCT 87; TO PURCHASE CALL 1-800-854-7179 USA/CANADA OR 303-397-7956 WORLDWIDE Organization: SEPT
Date: 2016-03-01
Description: Checklist for Guidance for Industry, FDA Reviewers and Compliance on Off-the Shelf Software Use in Medical Devices as amended by Guidance for Industry - Cyber security for Networked Medical Devices Containing Off-the Shelf (OTS) Software:2005
DNVGL-RP-0496 - CYBER SECURITY RESILIENCE MANAGEMENT FOR SHIPS AND MOBILE OFFSHORE UNITS IN OPERATION Organization: DNVGL
Date: 2016-09-01
Description: These non-targeted threats typically exploit known vulnerabilities in standard systems and networks. — Unintentional weaknesses in software: Typically stemming from misconfiguration of equipment and software as well as from software design or updates containing undetected weaknesses due to insufficient verification and validation of the software.
DS/ISO/IEC 30100-1 - INFORMATION TECHNOLOGY – HOME NETWORK RESOURCE MANAGEMENT – PART 1: REQUIREMENTS Organization: DS
Date: 2016-05-03
Description: This part of ISO/IEC 30100 specifies management requirements with respect to • device management • network topology • auto-configuration • device diagnosis and • software management • defines resources of a home network such as devices, networks and services, • specifies an information model of the relationship among home network resources and • specifies management application procedures based on a home resource model.
ISO - ISO/IEC 30100-1 - INFORMATION TECHNOLOGY – HOME NETWORK RESOURCE MANAGEMENT – PART 1: REQUIREMENTS - FIRST EDITION Organization: ISO
Date: 2016-04-01
Description: This part of ISO/IEC 30100 specifies management requirements with respect to • device management • network topology • auto-configuration • device diagnosis and • software management • defines resources of a home network such as devices, networks and services, • specifies an information model of the relationship among home network resources and • specifies management application procedures based on a home resource model.
DSF/ISO/IEC DIS 30100-1 - INFORMATION TECHNOLOGY - HOME NETWORK RESOURCE MANAGEMENT - PART 1: REQUIREMENTS Organization: DS
Description: It also describes user requirements and functional requirements. 190 This part of ISO/IEC 30100 191 - defines resources of a home network such as devices, networks and services, 192 - specifies an information model of the relationship among home network resources and 193 - specifies management application procedures based on home resource model. 194 This document defines new terminology for resources (abstraction of device, network, service 195 and location) in the home area network.
ATIS 0100014 - INFORMATION & COMMUNICATIONS SECURITY FOR NGN CONVERGED SERVICES IP NETWORKS AND INFRASTRUCTURE Organization: ATIS
Date: 2007-10-01
Description: Introduction This Technical Report discusses how to achieve the following security objectives: • Articulating the security needs of service providers, product developers, and large enterprises as it relates to their functional lifecycle • Recognizing potential threats & performing vulnerability analysis • Methodology for developing and using security architectures and using security frameworks • Understanding how to apply standards, best practices, and governmental regulations • Recognizing when to use what protocols • Applying accreditation procedures.
ISO - ISO/IEC 17811-2 - INFORMATION TECHNOLOGY - DEVICE CONTROL AND MANAGEMENT - PART 2: SPECIFICATION OF DEVICE CONTROL AND MANAGEMENT PROTOCOL - FIRST EDITION Organization: ISO
Date: 2015-02-15
Description: The network security is out of scope in this part of ISO/IEC 17811. However, the security services can be necessary according to applications of DCMP.
ASTM E2185 - STANDARD SPECIFICATION FOR TRANSFERRING DIGITAL VOICE DATA BETWEEN INDEPENDENT DIGITAL DICTATION SYSTEMS AND WORKSTATIONS Organization: ASTM
Date: 2001-12-10
Description: It does not define the hardware or software network protocols or storage media formats needed for message transmission (for example, see ISO 8072-1986) or the formats used to store data internally by the sender or receiver.

1 - 12 of 12 results