BSI 23/30470491 DC:2023 Edition
$13.70
BS ISO/IEC 15045-3-1. Information technology. Home Electronic System (HES) gateway – Part 3-1. Introduction to privacy, security, and safety
Published By | Publication Date | Number of Pages |
BSI | 2023 | 39 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | FOREWORD |
8 | INTRODUCTION |
11 | 1 Scope 2 Normative references 3 Terms, definitions, abbreviated terms and conventions 3.1 Terms and definitions |
13 | 3.2 Abbreviations 4 Conformance 5 Concepts, principles, structure, and guidelines 5.1 Privacy, security and safety concepts and principles in the HES gateway 5.2 Structure of the HES gateway system |
14 | 5.3 Basic HES gateway concepts, principles and practices 5.3.1 Key concepts, principles and practices 5.3.2 HES concept 5.3.3 HES gateway concept 5.3.4 Interface module concept 5.3.5 Service module concept |
15 | 5.3.6 Application platform concept 5.3.7 Internal communication bus concept 5.3.8 DSS principle and practice 5.4 Theory of operation |
16 | 5.5 Risk management 5.5.1 Introduction 5.5.2 Risk assessment 5.5.2.1 Overview of risk assessment |
17 | 5.5.2.2 Threats 5.5.2.2.1 Overview of threats 5.5.2.2.2 HAN Masquerade and replay |
18 | 5.5.2.2.3 WAN Masquerade and replay |
19 | 5.5.2.2.4 HAN Interception: eavesdropping and modification |
21 | 5.5.2.2.5 WAN Interception: eavesdropping and modification |
22 | 5.5.2.2.6 HAN Denial-of-service and resource-exhaustion attack |
23 | 5.5.2.2.7 WAN Denial-of-service and resource-exhaustion attack |
24 | 5.5.2.2.8 Software and configuration security: Trojan horses, worms, viruses |
25 | 5.5.2.2.9 Spyware/data leakage 5.5.2.2.10 Risks of commerce over the Internet |
26 | 5.5.2.2.11 Unintentional network to network interconnect 5.5.2.2.12 Communications internal to the HES Gateway (HES-CLIP) 5.5.2.3 Vulnerabilities, conditions and controls |
27 | 5.5.2.4 Risk levels; HAN, WAN, data |
29 | 5.5.3 Risk treatment 5.6 Privacy, security, and safety guidelines and requirements 5.6.1 Privacy-by-design approach 5.6.2 External services non-reliance principle and practice |
30 | 5.6.3 Use of wireless or shared media principle and practice 5.6.4 Privacy best practice 5.6.5 Privacy next best practice 5.6.6 Online update vulnerability principle 5.6.7 Online OS update vulnerability principle 5.6.8 “Social Engineering” vulnerability principle |
31 | 5.6.9 Privacy by design principle and practice 5.6.10 User priority principle 5.6.11 Fail-safe principle 5.6.12 Precautionary principle 5.6.13 Normal accident principle 5.6.14 Privacy principles 5.6.15 Watchdog practice 5.6.16 Redundancy principle |
32 | 6 Common services 6.1 Common services 6.2 Binding map 6.3 HES Gateway unique ID service module 6.4 Cryptographic services |
33 | 6.5 Authorization and authentication service 6.6 Time service |
34 | Annex A (informative) Privacy protection principles and sources A.1 Privacy protection Principles A.2 Sources |
36 | Annex B (informative) Guidance to developers B.1 General protection B.2 Privacy protection |
37 | B.3 Security protection B.4 Safety protection |
38 | References |
39 | Bibliography |