• IEC TS 62351-2:2008

    Current The latest, up-to-date edition.

    Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Language(s):  English

    Published date:  19-08-2008

    Publisher:  International Electrotechnical Committee

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    1 Scope and object
    2 Terms and definitions
      2.1 Glossary references and permissions
      2.2 Glossary of security and related communication terms
          2.2.1 Abstract Communication Service Interface (ACSI)
          2.2.2 Access
          2.2.3 Access Authority
          2.2.4 Access Control
          2.2.5 Access Control List (ACL)
          2.2.6 Accountability
          2.2.7 Adequate Security
          2.2.8 Advanced Encryption Standard (AES)
          2.2.9 Alarm
          2.2.10 Application Layer
          2.2.11 Association
          2.2.12 Assurance
          2.2.13 Asymmetric Cipher
          2.2.14 Asymmetric Cryptography
          2.2.15 Asymmetric Key Pair
          2.2.16 Attack
          2.2.17 Audit
          2.2.18 Audit Log
          2.2.19 Audit Record Field
          2.2.20 Audit Trail
          2.2.21 Authentic Signature
          2.2.22 Authentication
          2.2.23 Authorization
          2.2.24 Authorization Process
          2.2.25 Authorized User
          2.2.26 Availability
          2.2.27 Back Door
          2.2.28 Bandwidth
          2.2.29 Biometric
          2.2.30 Block Cipher
          2.2.31 Boundary Protection
          2.2.32 Buffer Overflow
          2.2.33 Bump-in-the-Stack
          2.2.34 Bump-in-the-Wire
          2.2.35 Call Back
          2.2.36 Certificate
          2.2.37 Certificate Management
          2.2.38 Certificate Revocation List (CRL)
          2.2.39 Certification
          2.2.40 Certification Authority (CA)
          2.2.41 Chain of Custody
          2.2.42 Challenge Handshake Authentication Protocol (CHAP)
          2.2.43 Challenge-Response, Challenge-Response Protocol
          2.2.44 Checksum
          2.2.45 Cipher
          2.2.46 Ciphertext
          2.2.47 Cleartext
          2.2.48 Client
          2.2.49 Compromise
          2.2.50 Computer Emergency Response Team (CERT)
          2.2.51 Computer Virus
          2.2.52 Confidentiality
          2.2.53 Conformance Test
          2.2.54 Control Network
          2.2.55 Control System
          2.2.56 Control System Operations
          2.2.57 Cookie
          2.2.58 Countermeasure
          2.2.59 Cracker
          2.2.60 Credential
          2.2.61 Critical System Resource
          2.2.62 Crypto-algorithm
          2.2.63 Cryptographic Hash
          2.2.64 Cryptographic Key
          2.2.65 Cryptography
          2.2.66 Cyber
          2.2.67 Cyber Attack
          2.2.68 Cyber Security
          2.2.69 Cyclic Redundancy Check (CRC)
          2.2.70 Data Authentication
          2.2.71 Data Corruption
          2.2.72 Data Encryption Standard (DES)
          2.2.73 Data Integrity
          2.2.74 Data Object (DO)
          2.2.75 Data Security
          2.2.76 Datagram
          2.2.77 Decode
          2.2.78 Decrypt
          2.2.79 Decryption
          2.2.80 De-Facto Standard
          2.2.81 Defence in Depth
          2.2.82 Denial of Service (DoS)
          2.2.83 Designated Approving Authority (DAA)
          2.2.84 Device
          2.2.85 Diffie-Hellman Key Exchange
          2.2.86 Digital Certificate
          2.2.87 Digital Data
          2.2.88 Digital Signature
          2.2.89 Digital Signature Standard (DSS)
          2.2.90 Distributed Control System (DCS)
          2.2.91 Dongle
          2.2.92 Eavesdropping
          2.2.93 Electronic Deception
          2.2.94 Elliptic Curve Cryptography
          2.2.95 Encrypt
          2.2.96 Encryption
          2.2.97 Firewall
          2.2.98 Flooding
          2.2.99 Flow Control
          2.2.100 Functions
          2.2.101 Gateway
          2.2.102 Generic Upper Layer Security (GULS)
          2.2.103 Hacker
          2.2.104 Hash Function
          2.2.105 Honey Pot
          2.2.106 Identification
          2.2.107 IEEE 802.11i
          2.2.108 Information Security
          2.2.109 Instrumentation, Systems, and Automation
                  Society (ISA)
          2.2.110 Integrity
          2.2.111 Intelligent Electronic Device (IED)
          2.2.112 Intercept
          2.2.113 Interchangeability
          2.2.114 Interface
          2.2.115 Internet Protocol security (IPsec)
          2.2.116 Interoperability
          2.2.117 Intruder
          2.2.118 Intrusion Detection System (IDS)
          2.2.119 Key
          2.2.120 Key Distribution
          2.2.121 Key Logger
          2.2.122 Key Pair
          2.2.123 Key Update
          2.2.124 Latency
          2.2.125 Local Area Network (LAN)
          2.2.126 Malicious Code
          2.2.127 Malware
          2.2.128 Management Information Base (MIB)
          2.2.129 Man-in-the-Middle Attack
          2.2.130 Manufacturing Message Specification (MMS)
          2.2.131 Masquerade
          2.2.132 Mockingbird
          2.2.133 Multicast
          2.2.134 Network Layer Protocol
          2.2.135 Network Management
          2.2.136 Non-repudiation
          2.2.137 Object Identifier (OID)
          2.2.138 Open Protocol
          2.2.139 Open System
          2.2.140 Open Systems Architecture
          2.2.141 Open Systems Interconnection - Reference Model
                  (OSI-RM)
          2.2.142 Password
          2.2.143 Personal Identification Number (PIN)
          2.2.144 Phishing
          2.2.145 Physical Layer Protocol
          2.2.146 Plaintext
          2.2.147 Point-to-Point Protocol (PPP)
          2.2.148 Port Scanning
          2.2.149 Pretty Good Privacy (PGP)
          2.2.150 Private Key
          2.2.151 Protection Profile
          2.2.152 Proxy, Proxy Server
          2.2.153 Pseudorandom Number Generator (PRNG)
          2.2.154 Public Key
          2.2.155 Public Key Asymmetric Cryptographic Algorithm
          2.2.156 Public Key Certificate
          2.2.157 Public Key Cryptography
          2.2.158 Public Key Infrastructure (PKI)
          2.2.159 Replay Attack
          2.2.160 Repudiation
          2.2.161 Risk
          2.2.162 Risk Assessment
          2.2.163 Risk Management
          2.2.164 Rivest, Shamir and Adleman (RSA)
          2.2.165 Role Based Access Control (RBAC)
          2.2.166 Secret Key
          2.2.167 Secret Key Encryption
          2.2.168 Secret Key Symmetric Cryptographic Algorithm
          2.2.169 Secure Hash Algorithm (SHA)
          2.2.170 Secure Shell (SSH)
          2.2.171 Secure Sockets Layer (SSL)
          2.2.172 Secure/Multipurpose Internet Mail Extensions
                  (S/MIME)
          2.2.173 Security
          2.2.174 Security Domain
          2.2.175 Security Guidelines
          2.2.176 Security Management
          2.2.177 Security Performance
          2.2.178 Security Perimeter
          2.2.179 Security Policy
          2.2.180 Security Risk Assessment
          2.2.181 Security Services
          2.2.182 Server
          2.2.183 Session Key
          2.2.184 Shoulder Surfing
          2.2.185 Signature Certificate
          2.2.186 Simple Network Management Protocol (SNMP)
          2.2.187 Smart Card
          2.2.188 Smurf
          2.2.189 Sniffing
          2.2.190 Social Engineering
          2.2.191 Spoof
          2.2.192 Spyware
          2.2.193 Strong Authentication
          2.2.194 Strong Secret
          2.2.195 Supervisory Control and Data Acquisition (SCADA)
          2.2.196 Symmetric Cryptography
          2.2.197 Symmetric Key
          2.2.198 Symmetric Key Algorithm
          2.2.199 SYN Flood
          2.2.200 Tamper Detection
          2.2.201 Tampering
          2.2.202 TASE.2
          2.2.203 Threat
          2.2.204 Throughput
          2.2.205 Traffic Analysis
          2.2.206 Transport Level Security (TLS)
          2.2.207 Trap Door
          2.2.208 Triple DES
          2.2.209 Trojan Horse
          2.2.210 Trust
          2.2.211 Tunnel
          2.2.212 Unforgeable
          2.2.213 Update Key
          2.2.214 Virtual Private Network (VPN)
          2.2.215 Virus
          2.2.216 Vulnerability
          2.2.217 Vulnerability Assessment
          2.2.218 Wide Area Network (WAN)
          2.2.219 WiFi
          2.2.220 Wired Equivalent Privacy (WEP)
          2.2.221 Wireless Application Protocol (WAP)
          2.2.222 Wireless LAN (WLAN)
          2.2.223 Worm
          2.2.224 X.509
    3 Abbreviations
          3.1.1 3DES
          3.1.2 ACL
          3.1.3 ACSI
          3.1.4 AES
          3.1.5 AGA
          3.1.6 ANSI
          3.1.7 BIS
          3.1.8 BSI
          3.1.9 BTW
          3.1.10 CA
          3.1.11 CERT
          3.1.12 CHAP
          3.1.13 CIP
          3.1.14 CRC
          3.1.15 CRL
          3.1.16 DAA
          3.1.17 DCS
          3.1.18 DES
          3.1.19 DO
          3.1.20 DoS
          3.1.21 DSS
          3.1.22 ECC
          3.1.23 EM/RF
          3.1.24 EMS
          3.1.25 FIPS
          3.1.26 GULS
          3.1.27 ICCP
          3.1.28 IDS
          3.1.29 IED
          3.1.30 IEEE
          3.1.31 IETF
          3.1.32 IPS
          3.1.33 IPsec
          3.1.34 ISA
          3.1.35 ISO
          3.1.36 IT
          3.1.37 LAN
          3.1.38 MIB
          3.1.39 MMS
          3.1.40 NERC
          3.1.41 NIST
          3.1.42 OID
          3.1.43 OSI-RM
          3.1.44 PGP
          3.1.45 PICS
          3.1.46 PIN
          3.1.47 PIXIT
          3.1.48 PKI
          3.1.49 PLC
          3.1.50 PLC
          3.1.51 PPP
          3.1.52 PRNG
          3.1.53 RA
          3.1.54 RBAC
          3.1.55 RSA
          3.1.56 RTU
          3.1.57 SCADA
          3.1.58 SHA
          3.1.59 SNMP
          3.1.60 SSH
          3.1.61 SSL
          3.1.62 TASE.2
          3.1.63 TDEA
          3.1.64 TDES
          3.1.65 TLS
          3.1.66 VPN
          3.1.67 WAN
          3.1.68 WEP
          3.1.69 WiFi
          3.1.70 WLAN
          3.1.71 WPA
    BIBLIOGRAPHY

    Abstract - (Show below) - (Hide below)

    IEC 62351-2:2008 (E) covers the key terms used in the IEC 62351 series, and is not meant to be a definitive list. Most terms used for cyber security are formally defined by other standards organizations, and so are included here with references to where they were originally defined.

    This publication is of core relevance for Smart Grid.

    General Product Information - (Show below) - (Hide below)

    Committee TC 57
    Development Note Stability Date: 2017. (09/2017)
    Document Type Technical Specification
    Publisher International Electrotechnical Committee
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    I.S. EN 62351-9:2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
    PD IEC/TS 60870-5-7:2013 Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351)
    IS/IEC/TS 62351 : Part 6 : 2007(R2016) Power Systems Management and Associated Information Exchange Data and Communication Security Part 6 Security for IEC 61850
    CEI EN 62351-11 : 1ED 2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 11: SECURITY FOR XML DOCUMENTS
    I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
    EN IEC 62933-1:2018 Electrical Energy Storage (EES) systems - Part 1: Vocabulary
    BIS IS/IEC/TS 62351-7 : 2010(R2016) POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 7: NETWORK AND SYSTEM MANAGEMENT (NSM) DATA OBJECT MODELS
    IEC 62351-9:2017 Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
    IEC TR 62351-13:2016 Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications
    EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    IEC TS 62933-4-1:2017 Electrical energy storage (EES) systems - Part 4-1: Guidance on environmental issues - General specification
    PD IEC/TR 62351-10:2012 Power systems management and associated information exchange. Data and communications security Security architecture guidelines
    BS EN 62351-9:2017 Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment
    BS EN 62351-7:2017 Power systems management and associated information exchange. Data and communications security Network and System Management (NSM) data object models
    17/30355602 DC : 0 BS EN 62351-4 ED.1.0 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 4: PROFILES INCLUDING MMS
    16/30320290 DC : DRAFT APR 2016 BS IEC 62351-7 ED1.0 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 7: NETWORK AND SYSTEM MANAGEMENT (NSM) DATA OBJECT MODELS
    IEC TR 61850-90-5:2012 Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118
    IEC 62933-1:2018 Electrical energy storage (EES) systems - Part 1: Vocabulary
    IEC 62351-3:2014+AMD1:2018 CSV Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
    IEC TS 62351-7:2010 Power systems management and associated information exchange - Data and communications security - Part 7: Network and system management (NSM) data object models
    BIS IS/IEC/TS 62351-5 : 2009(R2016) POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES
    PD IEC/TS 62351-5:2013 Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives
    DD IEC/TS 62351-7:2010 Power systems management and associated information exchange. Data and communication security Network and system management (NSM) data object models
    BIS IS/IEC/TS 62351-3 : 2007(R2016) POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 3: COMMUNICATION NETWORK AND SYSTEM SECURITY - PROFILES INCLUDING TCP/IP
    17/30356253 DC : 0 BS EN 62933-1 - ELECTRICAL ENERGY STORAGE (EES) SYSTEMS - PART 1: TERMINOLOGY
    BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
    NF EN 62351-3 : 2015 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 3: COMMUNICATION NETWORK AND SYSTEM SECURITY - PROFILES INCLUDING TCP/IP
    EN 62351-3:2014 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
    IEC TR 62351-10:2012 Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines
    IEC 62351-7:2017 Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models
    IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
    IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    PD IEC/TR 61850-90-12:2015 Communication networks and systems for power utility automation Wide area network engineering guidelines
    BS EN 62351-11:2017 Power systems management and associated information exchange. Data and communications security Security for XML documents
    DD IEC TS 62351-5 : DRAFT OCT 2009 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES
    PD IEC/TR 61850-90-5:2012 Communication networks and systems for power utility automation Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118
    BS EN 62351-3 : 2014 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 3: COMMUNICATION NETWORK AND SYSTEM SECURITY - PROFILES INCLUDING TCP/IP
    I.S. EN IEC 62933-1:2018 ELECTRICAL ENERGY STORAGE (EES) SYSTEMS - PART 1: VOCABULARY
    IEC 62351-11:2016 Power systems management and associated information exchange - Data and communications security - Part 11: Security for XML documents
    IEC TS 62933-5-1:2017 Electrical energy storage (EES) systems - Part 5-1: Safety considerations for grid-integrated EES systems - General specification
    16/30343872 DC : DRAFT JUNE 2016 BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
    EN 62351-7:2017 Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models
    I.S. EN 62351-11:2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 11: SECURITY FOR XML DOCUMENTS
    I.S. EN 62351-3:2014 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 3: COMMUNICATION NETWORK AND SYSTEM SECURITY - PROFILES INCLUDING TCP/IP
    I.S. EN 62351-7:2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 7: NETWORK AND SYSTEM MANAGEMENT (NSM) DATA OBJECT MODELS
    CEI EN 62351-9 : 1ED 2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
    EN 62351-11:2017 Power systems management and associated information exchange – Data and communications security - Part 11: Security for XML documents
    EN 62351-9:2017 Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment

    Standards Referencing This Book - (Show below) - (Hide below)

    IEC 60050-351:2013 International Electrotechnical Vocabulary (IEV) - Part 351: Control technology
    ISO/IEC 18028-1:2006 Information technology Security techniques IT network security Part 1: Network security management
    IEC 60870-5-102:1996 Telecontrol equipment and systems - Part 5: Transmission protocols - Section 102: Companion standard for the transmission of integrated totals in electric power systems
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    IEC 61850-7-2:2010 Communication networks and systems for power utility automation - Part 7-2: Basic information and communication structure - Abstract communication service interface (ACSI)
    IEC 61850-9-1:2003 Communication networks and systems in substations - Part 9-1: Specific Communication Service Mapping (SCSM) - Sampled values over serial unidirectional multidrop point to point link
    FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
    ISO 9506-2:2003 Industrial automation systems Manufacturing Message Specification Part 2: Protocol specification
    ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
    ISO/IEC 18043:2006 Information technology Security techniques Selection, deployment and operations of intrusion detection systems
    IEC 60870-5-104:2006+AMD1:2016 CSV Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles
    IEC 60870-5-103:1997 Telecontrol equipment and systems - Part 5-103: Transmission protocols - Companion standard for the informative interface of protection equipment
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
    ISO 9498:1993 Fluorspar Experimental methods for checking the bias of sampling and sample preparation
    ISO/IEC 18014-2:2009 Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens
    ISO/IEC 18028-2:2006 Information technology Security techniques IT network security Part 2: Network security architecture
    IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
    ISO/IEC 10731:1994 Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    ISO 9506-1:2003 Industrial automation systems Manufacturing Message Specification Part 1: Service definition
    IEC 60870-5-101:2003+AMD1:2015 CSV Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks
    IEC 61850-7-1:2011 Communication networks and systems for power utility automation - Part 7-1: Basic communication structure - Principles and models
    ISO/IEC 21827:2008 Information technology Security techniques Systems Security Engineering Capability Maturity Model (SSE-CMM)
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    IEC 61850-8-1:2011 Communication networks and systems for power utility automation - Part 8-1: Specific communication service mapping (SCSM) - Mappings to MMS (ISO 9506-1 and ISO 9506-2) and to ISO/IEC 8802-3
    ISO/IEC TR 15443-3:2007 Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods
    IEC 61850-9-2:2011 Communication networks and systems for power utility automation - Part 9-2: Specific communication service mapping (SCSM) - Sampled values over ISO/IEC 8802-3
    ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
    IEC 61850-7-420:2009 Communication networks and systems for power utility automation - Part 7-420: Basic communication structure - Distributed energy resources logical nodes
    ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
    IEC 61850-7-4:2010 Communication networks and systems for power utility automation - Part 7-4: Basic communication structure - Compatible logical node classes and data object classes
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    IEC 61850-7-3:2010 Communication networks and systems for power utility automation - Part 7-3: Basic communication structure - Common data classes
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC Guide 2:2004 Standardization and related activities General vocabulary
    IEC 61850-10:2012 Communication networks and systems for power utility automation - Part 10: Conformance testing
    ISA 99 CD : 2010 SECURITY GUIDELINES AND USER RESOURCES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 13335-1:2004 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    FIPS PUB 180 : 2002 SECURE HASH STANDARD
    ISA 5.1 : 1984 INSTRUMENTATION SYMBOLS AND IDENTIFICATION
    IEC TR 60870-1-3:1997 Telecontrol equipment and systems - Part 1: General considerations - Section 3: Glossary
    ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective