Indicative content 2.2: Application of Security standards for networked peripherals