Vážení zákazníci, v letošním roce budeme expedovat poslední objednávky ve středu 18. 12. 2024.

Těšíme se s vámi na shledanou od pondělí 06. 01. 2025.

 

Cena s DPH / bez DPH
Hlavní stránka>PD ISO/TR 23786:2019 Road vehicles. Solutions for remote access to vehicle. Criteria for risk assessment
Sponsored link
sklademVydáno: 2019-11-27
PD ISO/TR 23786:2019 Road vehicles. Solutions for remote access to vehicle. Criteria for risk assessment

PD ISO/TR 23786:2019

Road vehicles. Solutions for remote access to vehicle. Criteria for risk assessment

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
4898 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
489.80 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
1469.40 Kč
Anglicky Tisk
Skladem
4898 Kč
Označení normy:PD ISO/TR 23786:2019
Počet stran:22
Vydáno:2019-11-27
ISBN:978 0 539 02708 2
Status:Standard
Popis

PD ISO/TR 23786:2019


This standard PD ISO/TR 23786:2019 Road vehicles. Solutions for remote access to vehicle. Criteria for risk assessment is classified in these ICS categories:
  • 43.040.15 Car informatics. On board computer systems

This document identifies criteria that can be considered for assessing the risks related to solutions for remote access to road vehicles, including extended vehicles (ExVe) and their implementation.

Internal communication within the vehicle or the ExVe is out of the scope of this document.

Cybersecurity risks related to the VM infrastructure (except the elements that are part of the extended vehicle) and the road-side equipment are out of the scope of this document.

The criteria identified in this document are also applicable in the case of a risk assessment related to the specification of remote communication solutions, for example a technical standard.

The list of criteria that is provided can be considered as sufficiently comprehensive but not exhaustive, from a global point of view, to allow coherent risk mitigation, if such mitigation is necessary.

This document does not suggest nor specify any methodology for performing a risk assessment.

It does not aim at replacing any methodology, technical specification or standard relative to one or other specific type of risks (for example cyber security risks).