ASTM F3286-2017 Standard Guide for Cybersecurity and Cyberattack Mitigation《网络安全和网络攻击缓解的标准指南》.pdf
《ASTM F3286-2017 Standard Guide for Cybersecurity and Cyberattack Mitigation《网络安全和网络攻击缓解的标准指南》.pdf》由会员分享,可在线阅读,更多相关《ASTM F3286-2017 Standard Guide for Cybersecurity and Cyberattack Mitigation《网络安全和网络攻击缓解的标准指南》.pdf(8页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: F3286 17Standard Guide forCybersecurity and Cyberattack Mitigation1This standard is issued under the fixed designation F3286; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in paren
2、theses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.1. Scope1.1 This guide addresses the company or government orga-nizational need to mitigate the likelihood of cyberattacks andreduce the extent of potential cyber
3、attacks, which can leavesensitive personal data, corporate information, and criticalinfrastructure vulnerable to attackers.1.2 These recommendations are meant to serve as a guide-line for corporate and government organizations to adopt forthe protection of sensitive personal information and corporat
4、edata against hackers.1.3 Cybersecurity and cyberattacks are not limited to themaritime industry. With greater advancement in computer andinformation technology (IT), cyberattacks have increased infrequency and intensity over the past decade. These advance-ments provide hackers with more significant
5、 tools to attackvulnerable data and communication infrastructures. Cyberat-tacks have become an international issue to all governmentsand companies that interact with each other.1.4 Cybersecurity and the safety of cyber-enabled systemsare among the most prevailing issues concerning the maritimeindus
6、try as well as the global economy. Cyberattacks couldaffect the flow of trade or goods, but operator errors incomplex, automated systems may also cause disruptions thatmay be mitigated with proper policies and personnel training.1.5 This guide is meant to provide strategies for protectingsensitive d
7、ata onboard vessels and offshore operations.1.6 This standard does not purport to address all of thesafety concerns, if any, associated with its use. It is theresponsibility of the user of this standard to establish appro-priate safety, health, and environmental practices and deter-mine the applicab
8、ility of regulatory limitations prior to use.1.7 This international standard was developed in accor-dance with internationally recognized principles on standard-ization established in the Decision on Principles for theDevelopment of International Standards, Guides and Recom-mendations issued by the
9、World Trade Organization TechnicalBarriers to Trade (TBT) Committee.2. Referenced Documents2.1 Federal Standards:246 CFR 140.910 Equipment3. Terminology3.1 Definitions:3.1.1 access control, npractice of selective limiting of theability and means to communicate with or otherwise interactwith a system
10、, use system resources to handle information,gain knowledge of the information the system contains, orcontrol system components and functions.3.1.2 application programming interface, API, nset ofroutines, protocols, and tools for building software and appli-cations.3.1.3 botnet, nnumber of internet-
11、connected computerscommunicating with other similar machines in which compo-nents located on networked computers communicate andcoordinate their actions by command and control or by passingmessages to one another.3.1.4 capability, nability to execute a specified course ofaction.3.1.5 communications,
12、 nmeans for a vessel to communi-cate with another ship or an onshore facility.3.1.6 compression, nreduction in the number of bitsneeded to store or transmit data.3.1.7 cybersafety, nguidelines and standards forcomputerized, automated, and autonomous systems that ensurethose systems are designed, bui
13、lt, operated, and maintained soas to allow only predictable, repeatable behaviors, especially inthose areas of operation or maintenance that can affect human,system, enterprise, or environmental safety.3.1.8 cybersecurity, nactivity or process, ability orcapability, or state whereby information and
14、communicationsystems and the information contained therein are protectedfrom and defended against damage, unauthorized use ormodification, or exploitation.1This guide is under the jurisdiction of ASTM Committee F25 on Ships andMarine Technology and is the direct responsibility of Subcommittee F25.05
15、 onComputer Applications.Current edition approved Dec. 1, 2017. Published January 2018. DOI: 10.1520/F3286-17.2Available from U.S. Government Printing Office, Superintendent ofDocuments, 732 N. Capitol St., NW, Washington, DC 20401-0001, http:/www.access.gpo.gov.Copyright ASTM International, 100 Bar
16、r Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United StatesThis international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for theDevelopment of International Standards, Guides and Recomm
17、endations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.13.1.9 data assurance, nperception or an assessment ofdatas fitness and integrity to serve its purpose in a givencontext.3.1.10 data, nquantities, characters, or symbols on whichoperations are performed by a
18、 computer being stored andtransmitted in the form of electrical signals and recorded onmagnetic, optical, or mechanical recording media.3.1.11 detection processes, nmethods of detecting intru-sions into computers and networks.3.1.12 encryption, nconversion of electronic data intoanother form called
19、ciphertext, which cannot be easily under-stood by anyone except authorized parties.3.1.13 exposure, nmeasure of a system at risk that isavailable for inadvertent or malicious access.3.1.14 firewall, nlogical or physical break designed toprevent unauthorized access to information technology (IT)infra
20、structure and information.3.1.15 file transfer protocol, FTP, nstandard networkprotocol used to transfer computer files between a client andserver on a computer network.3.1.16 flaw, nunintended opening or access point in anysoftware.3.1.17 human system, ninteraction and contact between ahuman user a
21、nd a computer system.3.1.18 hypertext transfer protocol, HTTP, nprimary tech-nology protocol on the web that allows linking and browsing.3.1.19 hypertext transfer protocol over secure socket layer,HTTPS, nprotocol to transfer to encrypted data over the web.3.1.20 information technology, IT, nequipme
22、nt or inter-connected system or subsystem of equipment that is used in theautomatic acquisition, storage, manipulation, management,movement, control, display, switching, interchange,transmission, or reception of data or information.3.1.21 internet of things, IoT, ninternetworking of physi-cal device
23、s, such as vessels, vehicles, buildings and other itemsembedded with electronics, software, sensors, actuators, andnetwork connectivity that enable these objects to collect andexchange data.3.1.22 information security management system, ISMS,nset of policies with information security management orIT
24、-related risks.3.1.23 local area network, LAN, ncomputer network thatinterconnects computers within a particular area and does notconnect to the internet; this applies to onboard ship networks.3.1.24 machinery control systems, MCS, nIT systems thatreport operating parameters or control operation of
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTMF32862017STANDARDGUIDEFORCYBERSECURITYANDCYBERATTACKMITIGATION 网络安全 网络 攻击 缓解 标准 指南 PDF

链接地址:http://www.mydoc123.com/p-540211.html