PRICES include / exclude VAT
Homepage>BS Standards>33 TELECOMMUNICATIONS. AUDIO AND VIDEO ENGINEERING>33.200 Telecontrol. Telemetering>PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications
immediate downloadReleased: 2016-08-31
PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications

PD IEC/TR 62351-13:2016

Power systems management and associated information exchange. Data and communications security Guidelines on security topics to be covered in standards and specifications

Format
Availability
Price and currency
English Secure PDF
Immediate download
317.20 USD
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
31.72 USD
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
95.16 USD
English Hardcopy
In stock
317.20 USD
Standard number:PD IEC/TR 62351-13:2016
Pages:38
Released:2016-08-31
ISBN:978 0 580 93723 1
Status:Standard
DESCRIPTION

PD IEC/TR 62351-13:2016


This standard PD IEC/TR 62351-13:2016 Power systems management and associated information exchange. Data and communications security is classified in these ICS categories:
  • 33.200 Telecontrol. Telemetering

This part of IEC 62351, which is a Technical Report, provides guidelines on what security topics could or should be covered in standards and specifications (IEC or otherwise) that are to be used in the power industry, and the audience is therefore the developers of standards and specifications.

These guidelines cannot be prescriptive for every standard, since individual standards and specifications may legitimately have very different focuses, but it should be expected that the combination of such standards and specifications used in any implementation should cover these security topics. These guidelines are therefore to be used as a checklist for the combination of standards and specifications used in implementations of systems.

Out-of-scope are explicit methods for cyber security in product development, implementations, or operations.