CYBER (Registro nro. 5625)

000 -LEADER
fixed length control field 02324nam a22003257a 4500
001 - CONTROL NUMBER
control field 00005625
003 - CONTROL NUMBER IDENTIFIER
control field ES-MaONT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240117083912.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200124s2020 fr a fs i000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency ES-MaONT
245 00 - TITLE STATEMENT
Title CYBER
Remainder of title : Increasing smart meter security
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Sophia Antipolis :
Name of publisher, distributor, etc. ETSI,
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent 45 p. :
Other physical details il. ;
Dimensions 1 documento PDF
336 ## - CONTENT TYPE
Content type term texto (visual)
Source isbdcontent
337 ## - MEDIA TYPE
Media type term electrónico
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term recurso en línea
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Cyber security of Critical Infrastructure (CI) is a serious and ongoing challenge that affects electricity, gas and water, production and distribution networks up to a regional scale. The significance of cyber-physical infrastructure security substantially differs from cyber security in general, because of the implications imposed by the topology configuration that obeys specific laws of physics. <br/>analysis of energy distribution infrastructure is done in conjunction with application security in power systems to prevent, mitigate, and tolerate cyber-attacks. Currently, Energy Infrastructures use common and standardized communication protocols for bi-directional communication, including 5G and Internet protocols. In new scenario, previously unknown networked agents can<br/>interact with remote nodes of critical infrastructure. This fact has substantially changed the perception of cyber infrastructure security aspects in all business scenarios, including the metering one. As an effect, utility companies in general - and energy utilities specifically - require better safety measures, improved security, and highly reliable data protection.
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media.<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ciberseguridad y confianza
9 (RLIN) 2188
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Cyber security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cyber-attacks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term energy infrastructures
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term 5G
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term internet
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term smart meters
710 ## - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element European Telecommunications Standards Institute
Relator term ETSI
9 (RLIN) 1512
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.etsi.org/deliver/etsi_tr/103600_103699/103644/01.01.01_60/tr_103644v010101p.pdf
Nonpublic note Abierto
Link text Acceso al documento
Electronic format type pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Informes
Source of classification or shelving scheme
Existencias
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
      Acceso libre online Colección digital CDO CDO   24/01/2020   1000020175900 24/01/2020 24/01/2020 Informes pdf
Copyright© ONTSI. Todos los derechos reservados.
x
Esta web está utilizando la política de Cookies de la entidad pública empresarial Red.es, M.P. se detalla en el siguiente enlace: aviso-cookies. Acepto