{"id":136525,"date":"2024-10-19T07:52:39","date_gmt":"2024-10-19T07:52:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-c37-240-2015\/"},"modified":"2024-10-25T00:02:35","modified_gmt":"2024-10-25T00:02:35","slug":"ieee-c37-240-2015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-c37-240-2015\/","title":{"rendered":"IEEE C37.240 2015"},"content":{"rendered":"
New IEEE Standard – Active. Cybersecurity measures require that a balance be achieved between technical feasibility and economic feasibility and that this balance addresses the risks expected to be present at a substation. Further, cybersecurity measures must be designed and implemented in such a manner that access and operation to legitimate activities is not impeded, particularly during times of emergency or restoration activity. This standard presents a balance of the above factors.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std C37.240\u2122-2014 Front Cover <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Important Notice 1. Overview 1.1 Scope 1.2 Reason <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 2. Normative references <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3. Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4. Use of this standard 5. Description of cybersecurity 5.1 Problem statements from utilities and operational challenges <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2 Components of interest <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3 High-level security goals <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6. Cybersecurity requirements 6.1 High level requirements and priorities for interface categories <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.2 System communications components <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.3 Functional Requirements <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.4 User authentication and authorization <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.5 Data-in-motion protection 6.6 Configuration management <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.7 Security event auditing and analysis\/incident response <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.8 Security testing <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Back Cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems<\/b><\/p>\n |