{"id":136525,"date":"2024-10-19T07:52:39","date_gmt":"2024-10-19T07:52:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-c37-240-2015\/"},"modified":"2024-10-25T00:02:35","modified_gmt":"2024-10-25T00:02:35","slug":"ieee-c37-240-2015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-c37-240-2015\/","title":{"rendered":"IEEE C37.240 2015"},"content":{"rendered":"

New IEEE Standard – Active. Cybersecurity measures require that a balance be achieved between technical feasibility and economic feasibility and that this balance addresses the risks expected to be present at a substation. Further, cybersecurity measures must be designed and implemented in such a manner that access and operation to legitimate activities is not impeded, particularly during times of emergency or restoration activity. This standard presents a balance of the above factors.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std C37.240\u2122-2014 Front Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page <\/td>\n<\/tr>\n
5<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\nContents <\/td>\n<\/tr>\n
13<\/td>\nImportant Notice
1. Overview
1.1 Scope
1.2 Reason <\/td>\n<\/tr>\n
14<\/td>\n2. Normative references <\/td>\n<\/tr>\n
15<\/td>\n3. Acronyms and abbreviations <\/td>\n<\/tr>\n
16<\/td>\n4. Use of this standard
5. Description of cybersecurity
5.1 Problem statements from utilities and operational challenges <\/td>\n<\/tr>\n
17<\/td>\n5.2 Components of interest <\/td>\n<\/tr>\n
18<\/td>\n5.3 High-level security goals <\/td>\n<\/tr>\n
19<\/td>\n6. Cybersecurity requirements
6.1 High level requirements and priorities for interface categories <\/td>\n<\/tr>\n
21<\/td>\n6.2 System communications components <\/td>\n<\/tr>\n
24<\/td>\n6.3 Functional Requirements <\/td>\n<\/tr>\n
26<\/td>\n6.4 User authentication and authorization <\/td>\n<\/tr>\n
33<\/td>\n6.5 Data-in-motion protection
6.6 Configuration management <\/td>\n<\/tr>\n
34<\/td>\n6.7 Security event auditing and analysis\/incident response <\/td>\n<\/tr>\n
36<\/td>\n6.8 Security testing <\/td>\n<\/tr>\n
38<\/td>\nBack Cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2015<\/td>\n38<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":136527,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-136525","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/136525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/136527"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=136525"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=136525"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=136525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}