Trends and Developments in Security Standards for Secure Social Infrastructure Systems
نویسندگان
چکیده
Tsutomu Yamada Tadashi Kaji, Dr. Info. Toshihiko Nakano, Ph.D. OVERVIEW: Consolidation of standards suitable for control systems is an urgent task that must be accomplished if control system security is to be improved. When it comes to control system security standards, the consolidation of industry standards is happening more quickly, but international standards are also being formulated with four out of the 13 documents of the IEC 62443 series of standards already published. Also, ISASecure EDSA and CSMS certifi cation are standards for certifying conformance with security rules by control systems and control devices. The rapid acquisition of international certifi cations in terms of security is also important from the perspective of strengthening international competitiveness, and the Ministry of Economy, Trade and Industry is implementing a pilot project in order to enable the acquisition of these certifi cations from inside Japan. Hitachi is contributing to standardization activities aimed at the utilization of these standards.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملTrends in Cybersecurity and Latest Countermeasures
Satoshi Takemoto Makoto Kayashima, Ph.D. Kunihiko Miyazaki, Ph.D. Yasuko Fukuzawa, Ph.D. OVERVIEW: For the IT systems that underpin social infrastructure, advances are taking place in the fi elds of information systems, industrial control systems, and cyber-physical systems that are based on the high-level integration of these information and control systems. On the other hand, unauthorized acc...
متن کاملSecure M-Commerce with WPKI
The huge success of mobile telephone is about to transform ebusiness and the Internet. As a Personal Trusted Device PTD, the mobile phone, will be able to handle secure transactions in a wireless world. The Wireless Application Protocol (WAP) suite enables secure e-commerce services and applications. This paper present an overview of the PKI and the WAP environments and their relation to the In...
متن کاملA Comparative Study of Security Council's Dual Standards toward Recent Developments in Libya and Bahrain
With international peace and security covering a broader concept and restriction of governments' authority, issues such as human rights have become intertwined with international peace and security and are no longer an internal issue of governments. It is such that international society may react toward it and make some decisions. What seems important is how Security Council deals with such iss...
متن کامل