[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 9, Issue 2 (2-2021) ::
منادی 2021, 9(2): 3-12 Back to browse issues page
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Sofia Ahanj * , Mahsa Rahmani , Zahra Sadeghigole , Veda Nobakht
Niroo research institute
Abstract:   (1321 Views)
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory.
There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.
Keywords: ISO/IEC 15408, ISO/IEC 27001 series, NIST SP 800-53, NISTIR 7628, NIST 800-82, ISO/IEC 27019, ISA/IEC 62443 series.
Full-Text [PDF 510 kb]   (1143 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2020/10/5 | Accepted: 2022/02/21 | Published: 2022/02/21
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Ahanj S, Rahmani M, Sadeghigole Z, Nobakht V. Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry. منادی 2021; 9 (2) :3-12
URL: http://monadi.isc.org.ir/article-1-176-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 9, Issue 2 (2-2021) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 39 queries by YEKTAWEB 4645