Standard APSAD D32 Cyber security. Technical document for security or safety systems connected to an IP network

Par : APSAD
  • Paiement en ligne :
    • Livraison à domicile ou en point Mondial Relay indisponible
    • Retrait Click and Collect en magasin gratuit
  • Nombre de pages37
  • PrésentationBroché
  • FormatGrand Format
  • Poids0.135 kg
  • Dimensions21,0 cm × 29,5 cm × 0,2 cm
  • ISBN978-2-35505-258-3
  • EAN9782355052583
  • Date de parution01/06/2017
  • ÉditeurCNPP Editions

Résumé

The objective of D32 APSAD standard is to support users, specifiers and installers in the design and installation of security and safety systems capable of withstanding cyber attacks. It defines the best practices and minimal recommendations when these systems are connected to an IP network, using a four-step methodology : a risk analysis and then the design, construction and maintenance phases of the facility.
The approach is based on assessing the criticality of potential attacks, i.e. the ease with which an attack can be made and the severity of its impact. It is designed to protect security systems (in particular the confidentiality, integrity and availability of their data) but also the computer network on which they are deployed, the risk being that these systems become the weakest link and an access point for the spreading of attacks.
The objective of D32 APSAD standard is to support users, specifiers and installers in the design and installation of security and safety systems capable of withstanding cyber attacks. It defines the best practices and minimal recommendations when these systems are connected to an IP network, using a four-step methodology : a risk analysis and then the design, construction and maintenance phases of the facility.
The approach is based on assessing the criticality of potential attacks, i.e. the ease with which an attack can be made and the severity of its impact. It is designed to protect security systems (in particular the confidentiality, integrity and availability of their data) but also the computer network on which they are deployed, the risk being that these systems become the weakest link and an access point for the spreading of attacks.