{"id":408263,"date":"2024-10-20T05:29:49","date_gmt":"2024-10-20T05:29:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-274002022\/"},"modified":"2024-10-26T09:59:51","modified_gmt":"2024-10-26T09:59:51","slug":"bs-iso-iec-274002022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-274002022\/","title":{"rendered":"BS ISO\/IEC 27400:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 IoT concepts 5.1 General 5.2 Characteristics of IoT systems <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.3 Stakeholders of IoT systems 5.3.1 General 5.3.2 IoT service provider 5.3.3 IoT service developer <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3.4 IoT user 5.4 IoT ecosystem 5.5 IoT service life cycles <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.6 Domain based reference model <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6 Risk sources for IoT systems 6.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2 Risk sources 6.2.1 General 6.2.2 Sample risk sources related to IoT domains <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.2.3 Risk sources from outside the IoT domains <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.2.4 Privacy related risk sources <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7 Security and privacy controls 7.1 Security controls 7.1.1 General 7.1.2 Security controls for IoT service developer and IoT service provider <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.1.3 Security controls for IoT user <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.2 Privacy controls 7.2.1 General 7.2.2 Privacy controls for IoT service developer and IoT service provider <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 7.2.3 Privacy controls for IoT user <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Annex A (informative) IoT monitoring camera sample risk scenario <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cybersecurity. IoT security and privacy. Guidelines<\/b><\/p>\n |