Already a subscriber?
MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?
IEEE Standard for Information Technology: Hardcopy Device and System Security, 2008
- IEEE Std 2600™-2008 Front cover
- Title page
- Introduction
- Notice to users [Go to Page]
- Laws and regulations
- Copyrights
- Updating of IEEE documents
- Errata
- Interpretations
- Patents
- Participants
- Contents
- IMPORTANT NOTICE
- 1. Overview [Go to Page]
- 1.1 Scope
- 1.2 Purpose
- 1.3 Document structure
- 2. Definitions, special terms, acronyms, and abbreviations [Go to Page]
- 2.1 Definitions
- 2.2 Special terms
- 2.3 Acronyms and abbreviations
- 3. Introduction to hardcopy devices [Go to Page]
- 3.1 Hardcopy device overview
- 3.2 Generic architecture
- 3.3 Similarities and differences between HCDs and other IT devices
- 3.4 Determining the appropriate security strategy for an HCD
- 4. Operational environments [Go to Page]
- 4.1 Background
- 4.2 Operational Environment A
- 4.3 Operational Environment B
- 4.4 Operational Environment C
- 4.5 Operational Environment D
- 4.6 Choosing the most applicable operational environment
- 5. Hardcopy device assets [Go to Page]
- 5.1 Overview
- 5.2 HCD asset definitions
- 5.3 Asset values in the operational environments
- 6. Hardcopy device threats [Go to Page]
- 6.1 Overview
- 6.2 Threat summaries
- 6.3 Threat vectors and descriptions
- 6.4 Threat risk levels
- 7. Threat mitigation techniques [Go to Page]
- 7.1 Mitigating threats to HCD Availability
- 7.2 Mitigating threats to HCD Physical Resources
- 7.3 Mitigating threats to HCD User Document and User Function Data
- 7.4 Mitigating threats to HCD Confidential and Protected Data
- 7.5 Mitigating threats to HCD software
- 7.6 Mitigating threats to the HCD External Environment
- 8. Compliance [Go to Page]
- 8.1 Compliance security objectives for HCD manufacturers
- 8.2 Compliance security objectives for IT professionals
- Annex A (informative) Best practices [Go to Page]
- A.1 Overview
- A.2 Best practices for HCD architecture, design, deployment, and usage
- A.3 Best practices for physical security
- A.4 Best practices for network data confidentiality, integrity, and non-repudiation
- A.5 Best practices for configuration management
- A.6 Best practices for identification, authentication, and authorization
- A.7 Best practices for data security
- A.8 Best practices for logging and auditability
- A.9 Best practices for availability of service
- Annex B (informative) Bibliography [Go to Page]