Cena s DPH / bez DPH
Hlavní stránka>BS EN ISO/IEEE 11073-40102:2022 Health informatics. Device interoperability Foundational. Cybersecurity. Capabilities for mitigation
sklademVydáno: 2022-08-15
BS EN ISO/IEEE 11073-40102:2022 Health informatics. Device interoperability Foundational. Cybersecurity. Capabilities for mitigation

BS EN ISO/IEEE 11073-40102:2022

Health informatics. Device interoperability Foundational. Cybersecurity. Capabilities for mitigation

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
7320 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
732.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2196.00 Kč
Anglicky Tisk
Skladem
7320 Kč
Označení normy:BS EN ISO/IEEE 11073-40102:2022
Počet stran:36
Vydáno:2022-08-15
ISBN:978 0 539 18829 5
Status:Standard
Popis

BS EN ISO/IEEE 11073-40102:2022


This standard BS EN ISO/IEEE 11073-40102:2022 Health informatics. Device interoperability is classified in these ICS categories:
  • 35.240.80 IT applications in health care technology
Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The capability part of cybersecurity is information security controls related to both digital data and the relationships to safety and usability. For PHDs/PoCDs, this standard defines a security baseline of application layer cybersecurity mitigation techniques for certain use cases or for times when certain criteria are met. This standard provides a scalable information security toolbox appropriate for PHD/PoCD interfaces, which fulfills the intersection of requirements and recommendations from National Institute of Standards and Technology (NIST) and the European Network and Information Security Agency (ENISA). This standard maps to the NIST cybersecurity framework [B15]; IEC TR 80001-2-2 [B8]; and the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme. The mitigation techniques are based on the extended CIA triad (Clause 4) and are described generally to allow manufacturers to determine the most appropriate algorithms and implementations.