Difference between revisions of "IoTSec:Security and Privacy Functionality"

From its-wiki.no

Jump to: navigation, search
(Security, Privacy and Dependability Functionality)
(Security, Privacy and Dependability Functionality)
Line 6: Line 6:
 
The security functionality is available:  
 
The security functionality is available:  
 
* as [https://webprotege.stanford.edu/#projects/f3ce3328-fe4a-406b-a3ea-7908666c7642 ontology through WebProtege (login required)] in  
 
* as [https://webprotege.stanford.edu/#projects/f3ce3328-fe4a-406b-a3ea-7908666c7642 ontology through WebProtege (login required)] in  
* exported as word file [[File:SPD_Functionality.doc]]  
+
* [[Media:IoT_SecPrivFunc_LifeMap_v2.pdf|IoT Security and Privacy Functionality Life Map (.pdf)]]
 
[[File:Security-Privacy-Dependability_Functionality.png|900px|Security, privacy and dependability functionality (Orig:Owncloud)]]<br/>
 
[[File:Security-Privacy-Dependability_Functionality.png|900px|Security, privacy and dependability functionality (Orig:Owncloud)]]<br/>
 
Link: owncloud = IoTSec-IKTPluss =  IoT_SecPrivFunc_LifeMap_v2.xmind
 
Link: owncloud = IoTSec-IKTPluss =  IoT_SecPrivFunc_LifeMap_v2.xmind
 +
  
 
== Security and Privacy Functionality paragraphs ==
 
== Security and Privacy Functionality paragraphs ==

Revision as of 00:22, 6 February 2020

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

Security, Privacy and Dependability Functionality

Keywords: Security, Privacy, Dependability, Security Functionality

The starting point for the security listing is the representation of System of Systems through the Multi-Metrics analysis. Applications running on the systems typically have functional and non-functional requirements, which also addresses security and privacy requirements.

The security functionality is available:

Security, privacy and dependability functionality (Orig:Owncloud)
Link: owncloud = IoTSec-IKTPluss = IoT_SecPrivFunc_LifeMap_v2.xmind


Security and Privacy Functionality paragraphs

see word document

Related Standards

  • ISO 27000: Overview and Vocabulary (2014)
  • Seraj ISO 27001: ISMS Requirements (2013)
  • Toktam ISO 27002: Code of Practice (2013)
  • Elahe ISO 27003: ISMS Implementation Guidance (2010)


  • Seraj ISO 27004: ISM Measurement (2009)
  • Toktam ISO 27005: InfoSec Risk Management (2011)
  • Elahe ISO 27006: Requirements for Bodies Providing Audit and Certification of ISMS (2011)
  • Seraj ISO 27007 – 27008: Guidelines for Auditing InfoSec Controls (2011)
  • Toktam ISO 27014: Governance of InfoSec (2013)
  • Elahe ISO 27015: ISM Guidelines for Financial Services (2012) ‐ http://www.iso.org
  • ISO 31000 - Risk management