Shopping Cart

No products in the cart.

BSI 23/30470491 DC:2023 Edition

$13.70

BS ISO/IEC 15045-3-1. Information technology. Home Electronic System (HES) gateway – Part 3-1. Introduction to privacy, security, and safety

Published By Publication Date Number of Pages
BSI 2023 39
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
6 FOREWORD
8 INTRODUCTION
11 1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms and conventions
3.1 Terms and definitions
13 3.2 Abbreviations
4 Conformance
5 Concepts, principles, structure, and guidelines
5.1 Privacy, security and safety concepts and principles in the HES gateway
5.2 Structure of the HES gateway system
14 5.3 Basic HES gateway concepts, principles and practices
5.3.1 Key concepts, principles and practices
5.3.2 HES concept
5.3.3 HES gateway concept
5.3.4 Interface module concept
5.3.5 Service module concept
15 5.3.6 Application platform concept
5.3.7 Internal communication bus concept
5.3.8 DSS principle and practice
5.4 Theory of operation
16 5.5 Risk management
5.5.1 Introduction
5.5.2 Risk assessment
5.5.2.1 Overview of risk assessment
17 5.5.2.2 Threats
5.5.2.2.1 Overview of threats
5.5.2.2.2 HAN Masquerade and replay
18 5.5.2.2.3 WAN Masquerade and replay
19 5.5.2.2.4 HAN Interception: eavesdropping and modification
21 5.5.2.2.5 WAN Interception: eavesdropping and modification
22 5.5.2.2.6 HAN Denial-of-service and resource-exhaustion attack
23 5.5.2.2.7 WAN Denial-of-service and resource-exhaustion attack
24 5.5.2.2.8 Software and configuration security: Trojan horses, worms, viruses
25 5.5.2.2.9 Spyware/data leakage
5.5.2.2.10 Risks of commerce over the Internet
26 5.5.2.2.11 Unintentional network to network interconnect
5.5.2.2.12 Communications internal to the HES Gateway (HES-CLIP)
5.5.2.3 Vulnerabilities, conditions and controls
27 5.5.2.4 Risk levels; HAN, WAN, data
29 5.5.3 Risk treatment
5.6 Privacy, security, and safety guidelines and requirements
5.6.1 Privacy-by-design approach
5.6.2 External services non-reliance principle and practice
30 5.6.3 Use of wireless or shared media principle and practice
5.6.4 Privacy best practice
5.6.5 Privacy next best practice
5.6.6 Online update vulnerability principle
5.6.7 Online OS update vulnerability principle
5.6.8 “Social Engineering” vulnerability principle
31 5.6.9 Privacy by design principle and practice
5.6.10 User priority principle
5.6.11 Fail-safe principle
5.6.12 Precautionary principle
5.6.13 Normal accident principle
5.6.14 Privacy principles
5.6.15 Watchdog practice
5.6.16 Redundancy principle
32 6 Common services
6.1 Common services
6.2 Binding map
6.3 HES Gateway unique ID service module
6.4 Cryptographic services
33 6.5 Authorization and authentication service
6.6 Time service
34 Annex A (informative) Privacy protection principles and sources
A.1 Privacy protection Principles
A.2 Sources
36 Annex B (informative)
Guidance to developers
B.1 General protection
B.2 Privacy protection
37 B.3 Security protection
B.4 Safety protection
38 References
39 Bibliography
BSI 23/30470491 DC
$13.70