• Shopping Cart
    There are no items in your cart

PD IEC TR 62210:2003

Current

Current

The latest, up-to-date edition.

Power system control and associated communications. Data and communication security

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

04-07-2003

€306.17
Excluding VAT

FOREWORD
1 Scope and object
2 Overview
3 Reference documents
4 Terms, definitions and abbreviations
  4.1 Terms and definitions
  4.2 Abbreviations
5 Introduction to security
  5.1 How to use this report
6 The security analysis process
  6.1 Network topologies
  6.2 User consequence based analysis
      6.2.1 Stakeholders
  6.3 Consequences to be considered
      6.3.1 Financial
      6.3.2 Asset destruction/degradation
      6.3.3 Inability to restore service
  6.4 Consequences and security threats
7 Focus of security work within this report
  7.1 Justification of application level security focus
  7.2 Security analysis technique
      7.2.1 Security objectives
      7.2.2 General threats
      7.2.3 Specific threats to be considered in PP
8 Vulnerabilities
  8.1 Threats to topologies
  8.2 Current IEC Technical Committee 57 protocols
      8.2.1 TASE.1
      8.2.2 TASE.2
      8.2.3 IEC 60870-5
      8.2.4 IEC 61334
      8.2.5 IEC 61850
9 Recommendations for future IEC Technical Committee 57
  security work
Annex A (informative) What is a protection profile?
Annex B (informative) Protection profile for TASE.2
Annex C (Informative) Example of consequence diagrams

Applies to computerised supervision, control, metering, and protection systems in electrical utilities. Deals with security aspects related to communication protocols used within and between such systems, the access to, and use of the systems.

Committee
PEL/57
DocumentType
Standard
Pages
46
PublisherName
British Standards Institution
Status
Current

Applies to computerised supervision, control, metering, and protection systems in electrical utilities. Deals with security aspects related to communication protocols used within and between such systems, the access to, and use of the systems. Discusses realistic threats to the system and its operation, the vulnerability and the consequences of intrusion, actions and countermeasures to improve the current situation.

Standards Relationship
IEC TR 62210:2003 Identical

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 10181-7:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.