{"id":255676,"date":"2024-10-19T16:54:11","date_gmt":"2024-10-19T16:54:11","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62351-32014a12018\/"},"modified":"2024-10-25T12:22:09","modified_gmt":"2024-10-25T12:22:09","slug":"bs-en-62351-32014a12018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62351-32014a12018\/","title":{"rendered":"BS EN 62351-3:2014+A1:2018"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | European foreword Anchor 3 Foreword to amendment A1 <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Annex ZA (normative) Normative references to international publications with their corresponding European publications <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 1.1 Scope 1.2 Intended Audience 2 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Terms, definitions and abbreviations 3.1 Terms, definitions and abbreviations 3.2 Additional abbreviations 4 Security issues addressed by this standard 4.1 Operational requirements affecting the use of TLS in the telecontrol environment <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Security threats countered 4.3 Attack methods countered <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Mandatory requirements 5.1 Deprecation of cipher suites 5.2 Negotiation of versions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3 Session resumption 5.4 Session renegotiation <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.5 Message Authentication Code 5.6 Certificate support 5.6.1 Multiple Certification Authorities (CAs) <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.6.2 Certificate size 5.6.3 Certificate exchange 5.6.4 Public-key certificate validation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.7 Co-existence with non-secure protocol traffic 6 Optional security measure support 7 Referencing standard requirements <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8 Conformance <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communications security – Communication network and system security. Profiles including TCP\/IP<\/b><\/p>\n |