{"id":408263,"date":"2024-10-20T05:29:49","date_gmt":"2024-10-20T05:29:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-274002022\/"},"modified":"2024-10-26T09:59:51","modified_gmt":"2024-10-26T09:59:51","slug":"bs-iso-iec-274002022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-274002022\/","title":{"rendered":"BS ISO\/IEC 27400:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\n5 IoT concepts
5.1 General
5.2 Characteristics of IoT systems <\/td>\n<\/tr>\n
12<\/td>\n5.3 Stakeholders of IoT systems
5.3.1 General
5.3.2 IoT service provider
5.3.3 IoT service developer <\/td>\n<\/tr>\n
13<\/td>\n5.3.4 IoT user
5.4 IoT ecosystem
5.5 IoT service life cycles <\/td>\n<\/tr>\n
15<\/td>\n5.6 Domain based reference model <\/td>\n<\/tr>\n
16<\/td>\n6 Risk sources for IoT systems
6.1 General <\/td>\n<\/tr>\n
17<\/td>\n6.2 Risk sources
6.2.1 General
6.2.2 Sample risk sources related to IoT domains <\/td>\n<\/tr>\n
19<\/td>\n6.2.3 Risk sources from outside the IoT domains <\/td>\n<\/tr>\n
20<\/td>\n6.2.4 Privacy related risk sources <\/td>\n<\/tr>\n
21<\/td>\n7 Security and privacy controls
7.1 Security controls
7.1.1 General
7.1.2 Security controls for IoT service developer and IoT service provider <\/td>\n<\/tr>\n
38<\/td>\n7.1.3 Security controls for IoT user <\/td>\n<\/tr>\n
40<\/td>\n7.2 Privacy controls
7.2.1 General
7.2.2 Privacy controls for IoT service developer and IoT service provider <\/td>\n<\/tr>\n
46<\/td>\n7.2.3 Privacy controls for IoT user <\/td>\n<\/tr>\n
48<\/td>\nAnnex A (informative) IoT monitoring camera sample risk scenario <\/td>\n<\/tr>\n
50<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity. IoT security and privacy. Guidelines<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n52<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":408273,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-408263","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/408263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/408273"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=408263"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=408263"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=408263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}