ISO 23799:2024

International Standard   Current Edition · Approved on 26 January 2024

Ships and marine technology — Assessment of onboard cyber safety

ISO 23799:2024 Files

English 18 Pages
Current Edition
OMR 47.93

ISO 23799:2024 Scope

This document establishes the elements of onboard cyber risk assessment and specifies requirements for the assessment process, assessment preparation, risk identification, risk analysis and risk evaluation.

This document applies to the risk assessment of onboard cyber systems based on network technologies which mainly include bridge systems, cargo management systems, propulsion and machinery management and power control systems, access control systems, passenger or visitor servicing and management systems, passenger-facing networks, core infrastructure systems, administrative and crew welfare systems and communication systems.

Best Sellers

GSO 150-2:2013
 
Gulf Standard
Expiration dates for food products - Part 2 : Voluntary expiration dates
OS GSO 150-2:2013
GSO 150-2:2013 
Omani Standard
Expiration dates for food products - Part 2 : Voluntary expiration dates
OS GSO 2055-1:2015
GSO 2055-1:2015 
Omani Standard
HALAL FOOD - Part 1 : General Requirements
GSO 2055-1:2015
 
Gulf Technical Regulation
HALAL FOOD - Part 1 : General Requirements

Recently Published

ISO/IEC 19896-2:2026
 
International Standard
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for testers and validators according to ISO/IEC 19790 and ISO/IEC 24759
ISO 19067:2026
 
International Standard
Building and civil engineering sealants — Determination of changes in colour after laboratory accelerated weathering procedures
ISO 18962:2026
 
International Standard
Ships and marine technology — Installation and operational requirements for swappable batteries on ships
ISO/IEC 9995-11:2026
 
International Standard
Information technology — Keyboard layouts for office systems — Part 11: Functionality and labelling of dead keys