ISO/IEC 24767-1:2008
Current
Current
The latest, up-to-date edition.
Information technology — Home network security — Part 1: Security requirements
Available format(s)
Hardcopy , PDF
Language(s)
English
Published date
30-09-2008
€130.00
Excluding VAT
ISO/IEC 24767-1:2008 specifies the security requirements that may come from inside or outside a home. This standard gives guidance for the design of security mechnisms applied either inside home networks or through the Internet, and it provides means to analyse the risks for each networked device and to define its specific security requirements.
| DocumentType |
Standard
|
| Pages |
20
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Standards | Relationship |
| NEN ISO/IEC 24767-1 : 2008 | Identical |
| 14/30294372 DC : 0 | BS ISO/IEC 14543-5-7 - INFORMATION TECHNOLOGY - HOME ELECTRONIC SYSTEM (HES) ARCHITECTURE - PART 5-7: INTELLIGENT GROUPING AND 3 RESOURCE SHARING - REMOTE ACCESS SYSTEM ARCHITECTURE |
| ISO/IEC 14543-5-7:2015 | Information technology — Home electronic system (HES) architecture — Part 5-7: Intelligent grouping and 3 resource sharing — Remote access system architecture |
| BS ISO/IEC 14543-5-7:2015 | Information technology. Home electronic system (HES) architecture Intelligent grouping and resource sharing for HES Class 2 and Class 3. Remote access system architecture |
| ISO/IEC 14543-4-2:2008 | Information technology — Home electronic system (HES) architecture — Part 4-2: Communication layers — Transport, network and general parts of data link layer for network enhanced control devices of HES Class 1 |
| ISO/IEC TR 29108:2013 | Information technology — Terminology for intelligent homes |
| ISO/IEC 18033-3:2010 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
| ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
Summarise