Cena s DPH / bez DPH
Hlavní stránka>BS EN ISO/IEEE 11073-40101:2022 Health informatics. Device interoperability Foundational. Cybersecurity. Processes for vulnerability assessment
sklademVydáno: 2022-05-16
BS EN ISO/IEEE 11073-40101:2022 Health informatics. Device interoperability Foundational. Cybersecurity. Processes for vulnerability assessment

BS EN ISO/IEEE 11073-40101:2022

Health informatics. Device interoperability Foundational. Cybersecurity. Processes for vulnerability assessment

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
8700 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
870.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2610.00 Kč
Anglicky Tisk
Skladem
8700 Kč
Označení normy:BS EN ISO/IEEE 11073-40101:2022
Počet stran:58
Vydáno:2022-05-16
ISBN:978 0 539 18828 8
Status:Standard
Popis

BS EN ISO/IEEE 11073-40101:2022


This standard BS EN ISO/IEEE 11073-40101:2022 Health informatics. Device interoperability is classified in these ICS categories:
  • 35.240.80 IT applications in health care technology
Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD/PoCD. For PHDs/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to identification of cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System (eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring, mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an acceptable level of risk.