{"id":515780,"date":"2024-11-05T14:37:09","date_gmt":"2024-11-05T14:37:09","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-tr-1594704\/"},"modified":"2024-11-05T14:37:09","modified_gmt":"2024-11-05T14:37:09","slug":"can-csa-iso-iec-tr-1594704","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-tr-1594704\/","title":{"rendered":"CAN\/CSA-ISO\/IEC TR 15947:04"},"content":{"rendered":"

Scope<\/strong><\/p>\n

This is a Type 3 Technical Report (TR), which defines a framework for detection of intrusions in IT systems. Many classes of intrusions are considered.<\/p>\n

These include intrusions that are intentional or unintentional, legal or illegal, harmful or harmless and unauthorized access by insiders or outsiders.<\/p>\n

The TR focuses on: <\/p>\n