Vážení zákazníci, v letošním roce budeme expedovat poslední objednávky ve středu 18. 12. 2024.

Těšíme se s vámi na shledanou od pondělí 06. 01. 2025.

 

Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications
Sponsored link
sklademVydáno: 2016-08-31
PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications

PD IEC/TR 62351-13:2016

Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
318.39 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
31.84 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
95.52 €
Anglicky Hardcopy
In stock
318.39 €
Označení normy:PD IEC/TR 62351-13:2016
Počet stran:38
Vydáno:2016-08-31
ISBN:978 0 580 93723 1
Status:Standard
DESCRIPTION

PD IEC/TR 62351-13:2016


This standard PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security is classified in these ICS categories:
  • 33.200 Telecontrol. Telemetering

This part of IEC 62351, which is a Technical Report, provides guidelines on what security topics could or should be covered in standards and specifications (IEC or otherwise) that are to be used in the power industry, and the audience is therefore the developers of standards and specifications.

These guidelines cannot be prescriptive for every standard, since individual standards and specifications may legitimately have very different focuses, but it should be expected that the combination of such standards and specifications used in any implementation should cover these security topics. These guidelines are therefore to be used as a checklist for the combination of standards and specifications used in implementations of systems.

Out-of-scope are explicit methods for cyber security in product development, implementations, or operations.