Definitions Flashcards
(21 cards)
1-1
Concepts and Models
1-2
Master glossary of terms and abbreviations
1-3
System security and conformance metrics
1-4
IACS security lifecycle and use-cases
2-1
Security program requirements for IACS asset owners
2-2
IACS protection levels
2-3
Patch management in the IACS environment
2-4
Requirements for IACS service providers
2-5
Implementation guidance for IACS asset owners
3-1
Security technologies for IACS
3-2
Security risk assessment and system design
3-3
System security requirements and security levels
4-1
Secure product development and life cycle requirements
4-2
Technical security requirements for IACS components
FR1
Access Control
FR2
Use control
FR3
Data integrity
FR4
Data confidentiality
FR5
Restricted data flow
FR6
Timely response to events
FR7
Resource availability