×
Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
Projekta Nr. ISO/IEC WD TS 27115.3
Nosaukums <p class="MsoBodyText" style="margin-right: 69.65pt;">This document provides the foundations and concepts for the cybersecurity evaluation of complex systems. Two frameworks are defined:</p>
<p class="MsoListParagraph" style="line-height: 12.7pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt; margin: .1pt 91.25pt .0001pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->The first is used to specify the cybersecurity of a complex system, including system<span style="letter-spacing: -1.75pt;"> </span>of systems.</p>
<p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.5pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->The second is used to evaluate the corresponding cybersecurity<span style="letter-spacing: -.85pt;"> </span>solutions.</p>
<p class="MsoBodyText" style="line-height: 12.25pt; mso-line-height-rule: exactly;">The frameworks use basic architecture concepts:</p>
<p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->to enable description of reference or solution security<span style="letter-spacing: -.35pt;"> </span>architecture;</p>
<p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->to support model-based, comprehensive and scalable security solutions and their<span style="letter-spacing: -.85pt;"> </span>evaluation;</p>
<p class="MsoBodyText" style="margin-right: 69.65pt;"><span style="font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">to allow for the definition of architecture-based security profiles and hierarchies of<span style="letter-spacing: -.75pt;"> </span>profiles.</span></p>
Reģistrācijas numurs (WIID) 81627
Darbības sfēra <p class="MsoBodyText" style="margin-right: 69.65pt;">This document provides the foundations and concepts for the cybersecurity evaluation of complex systems. Two frameworks are defined:</p>
<p class="MsoListParagraph" style="line-height: 12.7pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt; margin: .1pt 91.25pt .0001pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->The first is used to specify the cybersecurity of a complex system, including system<span style="letter-spacing: -1.75pt;"> </span>of systems.</p>
<p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.5pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->The second is used to evaluate the corresponding cybersecurity<span style="letter-spacing: -.85pt;"> </span>solutions.</p>
<p class="MsoBodyText" style="line-height: 12.25pt; mso-line-height-rule: exactly;">The frameworks use basic architecture concepts:</p>
<p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->to enable description of reference or solution security<span style="letter-spacing: -.35pt;"> </span>architecture;</p>
<p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]-->to support model-based, comprehensive and scalable security solutions and their<span style="letter-spacing: -.85pt;"> </span>evaluation;</p>
<p class="MsoBodyText" style="margin-right: 69.65pt;"><span style="font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">to allow for the definition of architecture-based security profiles and hierarchies of<span style="letter-spacing: -.75pt;"> </span>profiles.</span></p>
Statuss Izstrādē
ICS grupa Nav uzstādīts