{"id":402836,"date":"2024-10-20T05:03:11","date_gmt":"2024-10-20T05:03:11","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-ieee-11073-401012022\/"},"modified":"2024-10-26T08:59:42","modified_gmt":"2024-10-26T08:59:42","slug":"bs-en-iso-ieee-11073-401012022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-ieee-11073-401012022\/","title":{"rendered":"BS EN ISO\/IEEE 11073-40101:2022"},"content":{"rendered":"

Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD\/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD\/PoCD. For PHDs\/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to identification of cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System (eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring, mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an acceptable level of risk.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nEuropean foreword
Endorsement notice <\/td>\n<\/tr>\n
8<\/td>\nBlank Page <\/td>\n<\/tr>\n
9<\/td>\nTitle page <\/td>\n<\/tr>\n
11<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
14<\/td>\nParticipants <\/td>\n<\/tr>\n
17<\/td>\nIntroduction <\/td>\n<\/tr>\n
18<\/td>\nContents <\/td>\n<\/tr>\n
19<\/td>\n1. Overview
1.1 General <\/td>\n<\/tr>\n
20<\/td>\n1.2 Scope
1.3 Purpose
1.4 Word usage <\/td>\n<\/tr>\n
21<\/td>\n2. Definitions, acronyms, and abbreviations
2.1 Definitions
2.2 Acronyms and abbreviations
3. Risk management <\/td>\n<\/tr>\n
22<\/td>\n4. Software of unknown provenance
5. Multi-component system vulnerability assessment
6. Threat modeling
6.1 General <\/td>\n<\/tr>\n
23<\/td>\n6.2 Data flow diagram
6.3 STRIDE classification scheme
7. Scoring system
7.1 General
7.2 CVSS <\/td>\n<\/tr>\n
24<\/td>\n7.3 eCVSS <\/td>\n<\/tr>\n
25<\/td>\n8. Process for vulnerability assessment
8.1 Iterative vulnerability assessment
8.2 System context
8.2.1 Use case description <\/td>\n<\/tr>\n
26<\/td>\n8.2.2 Actors <\/td>\n<\/tr>\n
28<\/td>\n8.2.3 Assets
8.2.4 Mapping actors to assets
8.3 System decomposition
8.3.1 General
8.3.2 Trust boundaries
8.3.3 Threat model <\/td>\n<\/tr>\n
29<\/td>\n8.3.4 Vulnerability list <\/td>\n<\/tr>\n
30<\/td>\n8.4 Scoring
8.4.1 General
8.4.2 eCVSS metric guidelines <\/td>\n<\/tr>\n
31<\/td>\n8.4.3 Suggested collateral damage <\/td>\n<\/tr>\n
32<\/td>\n8.4.4 System-wide metrics
8.4.5 Risk level thresholds
8.5 Mitigation
8.6 Iteration <\/td>\n<\/tr>\n
33<\/td>\nAnnex A (informative) Bibliography <\/td>\n<\/tr>\n
34<\/td>\nAnnex B (informative) STRIDE <\/td>\n<\/tr>\n
38<\/td>\nAnnex C (informative) embedded Common Vulnerability Scoring System <\/td>\n<\/tr>\n
45<\/td>\nAnnex D (informative) Microsoft TMT2Excel Macro <\/td>\n<\/tr>\n
48<\/td>\nAnnex E (informative) Example insulin delivery device vulnerability assessment <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Health informatics. Device interoperability – Foundational. Cybersecurity. Processes for vulnerability assessment<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n58<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":402846,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[704,2641],"product_tag":[],"class_list":{"0":"post-402836","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-80","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/402836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/402846"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=402836"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=402836"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=402836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}