Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
This document provides
- cybersecurity threats arising from a malicious actor that is covered by the essential cybersecurity requirements of Annex I,
Part I, (2)(a) to (2)(m) of the CRA, respectively, and
- cybersecurity security objectives derived from the essential cybersecurity requirements of Annex I, Part I, (2)(a) to (2)(m) of
the CRA that can serve as an input for the identification and treatment of cybersecurity risks.
This document serves as a supporting specification as referred to in Annex II, section 1 in the CRA SR
Reģistrācijas numurs (WIID)
82477
Darbības sfēra
This document provides
- cybersecurity threats arising from a malicious actor that is covered by the essential cybersecurity requirements of Annex I,
Part I, (2)(a) to (2)(m) of the CRA, respectively, and
- cybersecurity security objectives derived from the essential cybersecurity requirements of Annex I, Part I, (2)(a) to (2)(m) of
the CRA that can serve as an input for the identification and treatment of cybersecurity risks.
This document serves as a supporting specification as referred to in Annex II, section 1 in the CRA SR