Difference between revisions of "IoTSec:Security and Privacy Functionality"

From its-wiki.no

Jump to: navigation, search
(Security and Privacy Functionality paragraphs)
(Related Standards)
Line 18: Line 18:
 
* ISO 27000: Overview and Vocabulary (2014)
 
* ISO 27000: Overview and Vocabulary (2014)
 
* ''Seraj'' ISO 27001: ISMS Requirements (2013)  
 
* ''Seraj'' ISO 27001: ISMS Requirements (2013)  
* Toktam ISO 27002: Code of Practice (2013)
+
* ''Toktam'' ISO 27002: Code of Practice (2013)
* Elahe ISO 27003: ISMS Implementation Guidance (2010)
+
* ''Elahe'' ISO 27003: ISMS Implementation Guidance (2010)
  
 
   
 
   
Line 28: Line 28:
 
* ''Seraj'' ISO 27007 – 27008: Guidelines for Auditing InfoSec Controls (2011)
 
* ''Seraj'' ISO 27007 – 27008: Guidelines for Auditing InfoSec Controls (2011)
 
* ''Toktam'' ISO 27014: Governance of InfoSec (2013)
 
* ''Toktam'' ISO 27014: Governance of InfoSec (2013)
* ''Elaha'' ISO 27015: ISM Guidelines for Financial Services (2012) ‐ http://www.iso.org
+
* ''Elahe'' ISO 27015: ISM Guidelines for Financial Services (2012) ‐ http://www.iso.org
  
 
* ISO 31000 - Risk management
 
* ISO 31000 - Risk management

Revision as of 17:32, 15 June 2017

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

Security, Privacy and Dependability Functionality

Keywords: Security, Privacy, Dependability, Security Functionality

The starting point for the security listing is the representation of System of Systems through the Multi-Metrics analysis. Applications running on the systems typically have functional and non-functional requirements, which also addresses security and privacy requirements.

The security functionality is available:

Security, privacy and dependability functionality (Orig:Owncloud)
Link: https://owncloud.unik.no/index.php/apps/files/ajax/download.php?dir=%2F1-Projects%2FIoTSec-IKTPluss&files=SPD-Functionality.xmind

Security and Privacy Functionality paragraphs

see word document

Related Standards

  • ISO 27000: Overview and Vocabulary (2014)
  • Seraj ISO 27001: ISMS Requirements (2013)
  • Toktam ISO 27002: Code of Practice (2013)
  • Elahe ISO 27003: ISMS Implementation Guidance (2010)


  • Seraj ISO 27004: ISM Measurement (2009)
  • Toktam ISO 27005: InfoSec Risk Management (2011)
  • Elahe ISO 27006: Requirements for Bodies Providing Audit and Certification of ISMS (2011)
  • Seraj ISO 27007 – 27008: Guidelines for Auditing InfoSec Controls (2011)
  • Toktam ISO 27014: Governance of InfoSec (2013)
  • Elahe ISO 27015: ISM Guidelines for Financial Services (2012) ‐ http://www.iso.org
  • ISO 31000 - Risk management