{"id":255676,"date":"2024-10-19T16:54:11","date_gmt":"2024-10-19T16:54:11","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62351-32014a12018\/"},"modified":"2024-10-25T12:22:09","modified_gmt":"2024-10-25T12:22:09","slug":"bs-en-62351-32014a12018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62351-32014a12018\/","title":{"rendered":"BS EN 62351-3:2014+A1:2018"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
4<\/td>\nEuropean foreword
Anchor 3
Foreword to amendment A1 <\/td>\n<\/tr>\n
5<\/td>\nAnnex ZA (normative) Normative references to international publications with their corresponding European publications <\/td>\n<\/tr>\n
7<\/td>\nFOREWORD <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
1.1 Scope
1.2 Intended Audience
2 Normative references <\/td>\n<\/tr>\n
10<\/td>\n3 Terms, definitions and abbreviations
3.1 Terms, definitions and abbreviations
3.2 Additional abbreviations
4 Security issues addressed by this standard
4.1 Operational requirements affecting the use of TLS in the telecontrol environment <\/td>\n<\/tr>\n
11<\/td>\n4.2 Security threats countered
4.3 Attack methods countered <\/td>\n<\/tr>\n
12<\/td>\n5 Mandatory requirements
5.1 Deprecation of cipher suites
5.2 Negotiation of versions <\/td>\n<\/tr>\n
13<\/td>\n5.3 Session resumption
5.4 Session renegotiation <\/td>\n<\/tr>\n
14<\/td>\n5.5 Message Authentication Code
5.6 Certificate support
5.6.1 Multiple Certification Authorities (CAs) <\/td>\n<\/tr>\n
15<\/td>\n5.6.2 Certificate size
5.6.3 Certificate exchange
5.6.4 Public-key certificate validation <\/td>\n<\/tr>\n
18<\/td>\n5.7 Co-existence with non-secure protocol traffic
6 Optional security measure support
7 Referencing standard requirements <\/td>\n<\/tr>\n
19<\/td>\n8 Conformance <\/td>\n<\/tr>\n
20<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communications security – Communication network and system security. Profiles including TCP\/IP<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2018<\/td>\n22<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":255682,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-255676","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/255676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/255682"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=255676"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=255676"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=255676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}