Vážení zákazníci, v letošním roce budeme expedovat poslední objednávky ve středu 18. 12. 2024.

Těšíme se s vámi na shledanou od pondělí 06. 01. 2025.

 

Cena s DPH / bez DPH
Hlavní stránka>PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications
Sponsored link
sklademVydáno: 2016-08-31
PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications

PD IEC/TR 62351-13:2016

Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
7998 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
799.80 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2399.40 Kč
Anglicky Tisk
Skladem
7998 Kč
Označení normy:PD IEC/TR 62351-13:2016
Počet stran:38
Vydáno:2016-08-31
ISBN:978 0 580 93723 1
Status:Standard
Popis

PD IEC/TR 62351-13:2016


This standard PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security is classified in these ICS categories:
  • 33.200 Telecontrol. Telemetering

This part of IEC 62351, which is a Technical Report, provides guidelines on what security topics could or should be covered in standards and specifications (IEC or otherwise) that are to be used in the power industry, and the audience is therefore the developers of standards and specifications.

These guidelines cannot be prescriptive for every standard, since individual standards and specifications may legitimately have very different focuses, but it should be expected that the combination of such standards and specifications used in any implementation should cover these security topics. These guidelines are therefore to be used as a checklist for the combination of standards and specifications used in implementations of systems.

Out-of-scope are explicit methods for cyber security in product development, implementations, or operations.