Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 20 of 30 results

NPFC - FED-STD-1026 - TELECOMMUNICATIONS: INTEROPERABILITY AND SECURITY REQUIREMENTS FOR USE OF THE DATA ENCRYPTION STANDARD IN THE PHYSICAL LAYER OF DATA COMMUNICATIONS Organization: NPFC
Date: 1983-08-03
Description: This standard specifies interoperability and security related requirements for using encryption at the Physical Layer of the ISO Open Systems Interconnection (OSI) Reference Model in telecommunication systems conveying Automatic Data Processing (ADP) and/or narrative text information.
NPFC - FIPS PUB 139 - INTEROPERABILITY AND SECURITY REQUIREMENTS FOR USE OF THE DATA ENCRYPTION STANDARD IN THE PHYSICAL LAYER OF DATA COMMUNICATIONS Organization: NPFC
Date: 1983-08-03
Description: This standard specifies interoperability and security related requirements for using encryption at the Physical Layer of the ISO Open Systems Interconnection (OSI) Reference Model in telecommunication systems conveying Automatic Data Processing (ADP) and/or narrative text information.
ITG - APPLICATION SECURITY IN - APPLICATION SECURITY IN THE ISO27001 ENVIRONMENT Organization: ITG
Date: 2008-04-10
Description: Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001.
DS/ISO/IEC TR 27019 - INFORMATION TECHNOLOGY – SECURITY TECHNIQUES – INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY Organization: DS
Date: 2013-08-30
Description: These are covered by the standard ¡§ISO/IEC 27011:2008 Information technology ¡V Security techniques ¡V Information security management guidelines for telecommunications organizations based on ISO/IEC 27002¡¨.
ISO - ISO/IEC TR 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY - FIRST EDITION Organization: ISO
Date: 2013-07-15
Description: These are covered by the standard "ISO/IEC 27011:2008 Information technology – Security techniques – Information security management guidelines for telecommunications organizations based on ISO/IEC 27002".
DSF/ISO/IEC FDIS 27019 - INFORMATION TECHNOLOGY -- SECURITY TECHNIQUES -- INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY Organization: DS
Description: This includes in particular the following: <br />— central and distributed process control, monitoring and automation technology as well as information systems used for their operation, such as programming and parameterization devices; <br />— digital controllers and automation components such as control and field devices or Programmable Logic Controllers (PLCs), including digital sensor and actuator elements; <br />— all further supporting information systems used in the process control domain, e.g. for supplementary data visualization tasks and for controlling, monitoring, data archiving, historian logging, reporting and documentation purposes; <br />— communication technology used in the process control domain, e.g. networks, telemetry, telecontrol applications and remote control technology; <br />— Advanced Metering Infrastructure (AMI) components, e.g. smart meters; <br />— measurement devices, e.g. for emission values; <br />— digital protection and safety systems, e.g. protection relays, safety PLCs, emergency governor mechanisms; <br />— energy management systems, e.g. of distributed energy resources (DER), electric charging infrastructures, in private households, residential buildings or industrial customer installations; <br />— distributed components of smart grid environments, e.g. in energy grids, in private households, residential buildings or industrial customer installations; <br />— all software, firmware and applications installed on above mentioned systems, e.g.
DNVGL-RP-0496 - CYBER SECURITY RESILIENCE MANAGEMENT FOR SHIPS AND MOBILE OFFSHORE UNITS IN OPERATION Organization: DNVGL
Date: 2016-09-01
Description: These solutions typically include hardened firewalls, authentication concepts and network segregation as well as more secure software design and implementation. They need to be scaled to meet specific cyber security requirements of a particular organisation.
SEPT - ISO/IEC 27018 CHECKLIST - SOFTWARE ENGINEERING PROCESS TECHNOLOGY - CHECKLIST FOR STANDARD ISO/IEC 27018:2014 - INFORMATION SECURITY REQUIREMENTS -PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) Organization: SEPT
Date: 2017-07-18
Description: ISO/IEC 27018 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the protection of PII which might be applicable within the context of the information security risk environment(s) of a provider of public cloud services. ISO/IEC 27018 is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which provide information processing services as PII processors via cloud computing under contract to other organizations.
CLSI AUTO11 - INFORMATION TECHNOLOGY SECURITY OF IN VITRO DIAGNOSTIC INSTRUMENTS AND SOFTWARE SYSTEMS; APPROVED STANDARD - SECOND EDITION; VOL 34; NO 17 Organization: CLSI
Date: 2014-10-01
Description: This standard specifies technical and operational requirements and technical implementation procedures related to information technology (IT) security of in vitro diagnostic (IVD) systems (devices, analytical instruments, data management systems, etc.) installed at a health care organization (HCO).
SEPT - ISO/IEC 27018 CHECKLIST* - * IN EDITABLE MICROSOFT WORD - SOFTWARE ENGINEERING PROCESS TECHNOLOGY - CHECKLIST FOR STANDARD ISO/IEC 27018:2014 - INFORMATION SECURITY REQUIREMENTS - PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) - PRODUCT 93; INCLUDES ACCESS TO ADDITIONAL CONTENT Organization: SEPT
Date: 2017-07-18
Description: ISO/IEC 27018 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the protection of PII which might be applicable within the context of the information security risk environment(s) of a provider of public cloud services. ISO/IEC 27018 is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which provide information processing services as PII processors via cloud computing under contract to other organizations.
ISO - ISO/IEC 25024 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - MEASUREMENT OF DATA QUALITY - FIRST EDITION Organization: ISO
Date: 2015-10-15
Description: This International Standard defines data quality measures for quantitatively measuring the data quality in terms of characteristics defined in ISO/IEC 25012.
CSA ISO/IEC 25024 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - MEASUREMENT OF DATA QUALITY Organization: CSA
Date: 2016-01-01
Description: This International Standard defines data quality measures for quantitatively measuring the data quality in terms of characteristics defined in ISO/IEC 25012.
ASTM E2185 - STANDARD SPECIFICATION FOR TRANSFERRING DIGITAL VOICE DATA BETWEEN INDEPENDENT DIGITAL DICTATION SYSTEMS AND WORKSTATIONS Organization: ASTM
Date: 2001-12-10
Description: Since some standardization in storage media format and network protocols would help to promote the exchange of data between computer systems with diverse hardware and software, it is suggested that readily available universal media and formats be used for data exchange when possible.
DSF/ISO/IEC FDIS 15026-2 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 2: ASSURANCE CASE Organization: DS
Description: Assurance cases are generally developed to support claims in areas such as safety, reliability, maintainability, human factors, operability, and security, although these assurance cases are often called by more specific names, e.g. safety case or reliability and maintainability (R&M) case.
DS/ISO/IEC 27019 - INFORMATION TECHNOLOGY – SECURITY TECHNIQUES – INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY Organization: DS
Date: 2017-11-06
Description: ISO/IEC 27019:2017 provides guidance based on ISO/IEC 27002:2013 applied to process control systems used by the energy utility industry for controlling and monitoring the production or generation, transmission, storage and distribution of electric power, gas, oil and heat, and for the control of associated supporting processes.
ISO - ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY - FIRST EDITION Organization: ISO
Date: 2017-10-01
Description: This includes in particular the following: — central and distributed process control, monitoring and automation technology as well as information systems used for their operation, such as programming and parameterization devices; — digital controllers and automation components such as control and field devices or Programmable Logic Controllers (PLCs), including digital sensor and actuator elements; — all further supporting information systems used in the process control domain, e.g. for supplementary data visualization tasks and for controlling, monitoring, data archiving, historian logging, reporting and documentation purposes; — communication technology used in the process control domain, e.g. networks, telemetry, telecontrol applications and remote control technology; — Advanced Metering Infrastructure (AMI) components, e.g. smart meters; — measurement devices, e.g. for emission values; — digital protection and safety systems, e.g. protection relays, safety PLCs, emergency governor mechanisms; — energy management systems, e.g. of Distributed Energy Resources (DER), electric charging infrastructures, in private households, residential buildings or industrial customer installations; — distributed components of smart grid environments, e.g. in energy grids, in private households, residential buildings or industrial customer installations; — all software, firmware and applications installed on above-mentioned systems, e.g.
ISO - ISO 28005-1 - SECURITY MANAGEMENT SYSTEMS FOR THE SUPPLY CHAIN - ELECTRONIC PORT CLEARANCE (EPC) - PART 1: MESSAGE STRUCTURES - FIRST EDITION Organization: ISO
Date: 2013-03-01
Description: This part of ISO 28005 specifies necessary guidance information related to electronic port clearance [EPC], such as message transmission requirements, business scenarios, message structures and software requirements. Within the context of this part of ISO 28005, EPC includes the activities that a user, such as a ship's master, a shipping agency or a ship owner undertakes to submit electronic data to appropriate organizations that approve or reject the clearance for the ship to enter or leave port.
DS/ISO 28005-1 - SECURITY MANAGEMENT SYSTEMS FOR THE SUPPLY CHAIN - ELECTRONIC PORT CLEARANCE (EPC) - PART 1: MESSAGE STRUCTURES Organization: DS
Date: 2013-03-20
Description: The information to be transferred is that which is defined by the FAL Convention and other related international instruments as identified by ISO 28005-2. These message structures are primary intended for machine to machine data transfers.
DSF/ISO/DIS 28005-1 - SECURITY MANAGEMENT SYSTEMS FOR THE SUPPLY CHAIN - ELECTR ONIC PORT CLEARANCE (EPC) - PART 1: MESSAGE STRUCTURES Organization: DS
Description: The information to be transferred is that which is defined by the FAL Convention and other related international instruments as identified by ISO 28005-2. These message structures are primary intended for machine to machine data transfers.
ISO - ISO DIS 28005-1 - SECURITY MANAGEMENT SYSTEMS FOR THE SUPPLY CHAIN - ELECTRONIC PORT CLEARANCE (EPC) - PART 1: MESSAGE STRUCTURES Organization: ISO
Date: 2012-09-09
Description: The information to be transferred is that which is defined by the FAL Convention and other related international instruments as identified by ISO 28005-2. These message structures are primary intended for machine to machine data transfers.

1 - 20 of 30 results