Your shopping cart is empty!
PDF Preview
BSI Group , 05/23/2019
Publisher: BS
File Format: PDF
$132.00$264.16
NOTE 1 For example, an attack on a machine (safety function) such that it affects the availability of the machine and can result in a safety function being bypassed.
Considered security aspects of the machine with potential relation to SCS are:
— vulnerabilities of the SCS either directly or indirectly through the other parts of the machine which can be exploited by security threats that can result in security attacks (security breach);— influence on the safety characteristics and ability of the SCS to properly perform its function(s);— typical use case definition and application of a corresponding threat model.
NOTE 2 For other aspects of security threats and vulnerabilities, the provisions of the IEC 62443 (all parts) can apply.Cross References:ISO 12100:2010ISO 13849-1:2015IEC 62061IEC 60204-1IEC 61508-3ISO 14119IEC 62443 (all parts)IEC 61508-4ISO/IEC 27001IEC 61496 (all parts)IEC 61508-2IEC 62443-3-3:2013 IEC 62443-4-1:2018IEC 62443-2-4:2015ISO/IEC Guide 51:2014IEC 62443-2-1:2010ISO 13849-2:2012IEC TS 62443-1-1:2009
$155.00 $310.00
$132.00 $264.16
$95.00 $190.50
$199.00 $398.78