{"id":239865,"date":"2024-10-19T15:41:39","date_gmt":"2024-10-19T15:41:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-19-30398396-dc\/"},"modified":"2024-10-25T10:24:32","modified_gmt":"2024-10-25T10:24:32","slug":"bsi-19-30398396-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-19-30398396-dc\/","title":{"rendered":"BSI 19\/30398396 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
7<\/td>\nFOREWORD <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Application <\/td>\n<\/tr>\n
11<\/td>\n3 Normative references
4 Terms and definitions <\/td>\n<\/tr>\n
15<\/td>\n5 Module A: Data files
5.1 General
5.2 Requirements <\/td>\n<\/tr>\n
17<\/td>\n5.3 Methods of testing and required test results
6 Module B: Execution of executables
6.1 General
6.2 Requirements for executable program file verification
6.3 Methods of testing and required test results <\/td>\n<\/tr>\n
18<\/td>\n7 Module C: User authentication
7.1 General
7.2 Requirements <\/td>\n<\/tr>\n
19<\/td>\n7.3 Methods of testing and required test results <\/td>\n<\/tr>\n
20<\/td>\n8 Module D: System defence
8.1 General
8.2 Requirements \u2013 Malware protection <\/td>\n<\/tr>\n
22<\/td>\n8.3 Methods of testing and required test results <\/td>\n<\/tr>\n
23<\/td>\n8.4 Requirements \u2013 Denial of service <\/td>\n<\/tr>\n
24<\/td>\n8.5 Methods of testing and required test results <\/td>\n<\/tr>\n
25<\/td>\n9 Module E: Network access
9.1 General <\/td>\n<\/tr>\n
26<\/td>\n9.2 Equipment which connects to a network
9.2.1 Requirements
9.2.2 Methods of testing and required test results
9.3 Equipment providing network access between controlled networks
9.3.1 Requirements <\/td>\n<\/tr>\n
27<\/td>\n9.3.2 Methods of testing and required test results
9.4 Equipment providing network access between controlled and uncontrolled networks
9.4.1 Requirements
9.4.2 Methods of testing and required test results <\/td>\n<\/tr>\n
28<\/td>\n10 Module F: Access to operating system
10.1 General
10.2 Requirements
10.3 Methods of testing and required test results
11 Module G: Booting environment
11.1 General
11.2 Requirements <\/td>\n<\/tr>\n
29<\/td>\n11.3 Methods of testing and required test results
12 Module H: Maintenance mode
12.1 General
12.2 Requirements <\/td>\n<\/tr>\n
30<\/td>\n12.3 Methods of testing and required test results
13 Module I: Protection against unintentional crash caused by user input
13.1 General
13.2 Requirements
13.3 Methods of testing and required test results <\/td>\n<\/tr>\n
31<\/td>\n14 Module J: Interfaces for removable devices including USB
14.1 General
14.2 Requirements for procedural method option
14.3 Methods of testing and required test results for procedural method option
14.4 Requirements for technical method option
14.4.1 Physical protection
14.4.2 Operational protection <\/td>\n<\/tr>\n
32<\/td>\n14.5 Methods of testing and required test results for technical method option
14.5.1 Physical protection
14.5.2 Operational protection <\/td>\n<\/tr>\n
33<\/td>\n15 Module K: IEC 61162-1 or IEC 61162-2 as interface
15.1 General
15.2 Requirements
16 Module L: IEC 61162-450 as interface
16.1 General
16.2 Requirements related to IEC 61162-1 sentences
16.3 Requirements related to IEC 61162-450 used for file transfer <\/td>\n<\/tr>\n
34<\/td>\n17 Module M: Other interfaces
17.1 General
18 Module N: Software maintenance
18.1 General
18.2 Software maintenance in maintenance mode
18.2.1 Requirements
18.2.2 Methods of testing and required test results <\/td>\n<\/tr>\n
35<\/td>\n18.3 Semi-automatic software maintenance by the crew onboard the vessel
18.3.1 General
18.3.2 Requirements <\/td>\n<\/tr>\n
36<\/td>\n18.3.3 Methods of testing and required test results
19 Module O: Remote maintenance
19.1 General <\/td>\n<\/tr>\n
37<\/td>\n19.2 Requirements
20 Documentation
20.1 Requirements
20.2 Methods of testing and required test results <\/td>\n<\/tr>\n
38<\/td>\nAnnex A (informative) Guidance on implementing virus and malware protection on type approved equipment for IMO SOLAS regime and practical limitations <\/td>\n<\/tr>\n
40<\/td>\nAnnex B (Normative) File authentication
B.1 General
B.1.1 Digital Signatures <\/td>\n<\/tr>\n
41<\/td>\nB.1.2 Digital signatures \u2013 Methods of testing and required test results
B.1.3 Symmetric means based upon pre-shared secret keys <\/td>\n<\/tr>\n
42<\/td>\nB.1.4 Symmetric means based upon pre-shared secret keys \u2013 Methods of testing and required test results <\/td>\n<\/tr>\n
43<\/td>\nAnnex C (informative) Methods of authentication of data files and executables \u2013 some examples
C.1 General
C.2 Terms and definitions <\/td>\n<\/tr>\n
44<\/td>\nC.3 Asymmetric Cryptography
C.4 Digital Signatures <\/td>\n<\/tr>\n
45<\/td>\nC.5 Public Key Infrastructure
C.5.1 General theory <\/td>\n<\/tr>\n
47<\/td>\nC.5.2 Notes about shipboard use <\/td>\n<\/tr>\n
48<\/td>\nC.6 Symmetric key authentication based on \u2018pre-shared secret key\u2019 <\/td>\n<\/tr>\n
50<\/td>\nAnnex D (normative) USB class codes
D.1 General <\/td>\n<\/tr>\n
51<\/td>\nAnnex E (Informative) Cyber security configuration document for equipment
E.1 General for the document
E.2 Document parts
E.2.1 Hardening of the operating system
E.2.2 Update strategy for cyber security reasons
E.2.3 Strategies for detecting and reacting to future vulnerabilities <\/td>\n<\/tr>\n
52<\/td>\nAnnex F (Informative) Guidance on interconnection between networks
F.1 General
F.2 Guidance <\/td>\n<\/tr>\n
54<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS EN 63154. Maritime navigation and radiocommunication equipment and systems. Cybersecurity. General requirements, methods of testing and required test results<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2019<\/td>\n54<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":239871,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[792,2641],"product_tag":[],"class_list":{"0":"post-239865","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-47-020-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/239865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/239871"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=239865"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=239865"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=239865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}