• PD IEC TR 62210:2003

    Current The latest, up-to-date edition.

    Power system control and associated communications. Data and communication security

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  04-07-2003

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    1 Scope and object
    2 Overview
    3 Reference documents
    4 Terms, definitions and abbreviations
      4.1 Terms and definitions
      4.2 Abbreviations
    5 Introduction to security
      5.1 How to use this report
    6 The security analysis process
      6.1 Network topologies
      6.2 User consequence based analysis
          6.2.1 Stakeholders
      6.3 Consequences to be considered
          6.3.1 Financial
          6.3.2 Asset destruction/degradation
          6.3.3 Inability to restore service
      6.4 Consequences and security threats
    7 Focus of security work within this report
      7.1 Justification of application level security focus
      7.2 Security analysis technique
          7.2.1 Security objectives
          7.2.2 General threats
          7.2.3 Specific threats to be considered in PP
    8 Vulnerabilities
      8.1 Threats to topologies
      8.2 Current IEC Technical Committee 57 protocols
          8.2.1 TASE.1
          8.2.2 TASE.2
          8.2.3 IEC 60870-5
          8.2.4 IEC 61334
          8.2.5 IEC 61850
    9 Recommendations for future IEC Technical Committee 57
      security work
    Annex A (informative) What is a protection profile?
    Annex B (informative) Protection profile for TASE.2
    Annex C (Informative) Example of consequence diagrams

    Abstract - (Show below) - (Hide below)

    Applies to computerised supervision, control, metering, and protection systems in electrical utilities. Deals with security aspects related to communication protocols used within and between such systems, the access to, and use of the systems.

    Scope - (Show below) - (Hide below)

    Applies to computerised supervision, control, metering, and protection systems in electrical utilities. Deals with security aspects related to communication protocols used within and between such systems, the access to, and use of the systems. Discusses realistic threats to the system and its operation, the vulnerability and the consequences of intrusion, actions and countermeasures to improve the current situation.

    General Product Information - (Show below) - (Hide below)

    Committee PEL/57
    Document Type Standard
    Publisher British Standards Institution
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 10181-7:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework
    ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective