Small or Medium scale focused research project STREP MICIE
|
|
- Gervais Greene
- 8 years ago
- Views:
Transcription
1 FP7-ICT-SEC ICT-SEC MICIE Small or Medium scale focused research project STREP MICIE Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures Grant agreement no.: WP5000 Secure Mediation Gateway D5.1 On-line Risk Prediction Tool SW Beta Release Submission date: 30/11/2010 Organisation name of lead contractor for this deliverable: SELEX COMMS Dissemination Level PU Public Start date of project: 01 September 2008 Duration: 30 months
2 Editor Authors Stefano Panzieri ROMA3 SCOM, CRPHT, ROMA3, PIAP Work package WP5000 Tasks 5001 Internal Review Approval Date On-line Risk Prediction Tool SW Beta Release 2
3 Table of Contents Table of Contents...3 List of Figures...4 Terminology...5 List of acronyms Introduction On-line risk prediction tool architecture Prediction Module Association.xml Net.xml Entity.xml Status.xml Aggregation Module Merge.xml Filter Module Filter.java Communication Module Package org.me.cisiawebservice Package MicieClient Operator Interface Module From Xml to TAG Database C# Program From TAG Database to Xml C# Program On-line Risk Prediction Tool SW Beta Release 3
4 List of Figures Figure 1 MICIE on-line tool architecture...1 Figure 2 The on-line risk prediction tool architecture...1 Figure 3 Prediction Module...1 Figure 4 Aggregation Module Architecture...1 Figure 5 Filtering Module Architecture...1 Figure 6 Communication Module Architecture...1 Figure 7 UML diagram for the risk prediction web service...1 Figure 8 UML diagram for risk prediction web client...1 Figure 9 Operator Interface...1 Figure 10 ifix Architecture...1 Figure 11 The electric operator interface...1 Figure 12 The telecommunication operator interface...1 Figure 13 The service layer interface...1 Figure 14 The medium voltage grid interface...1 Figure 15 The telecommunication network interface...1 Figure 16 The SCADA system interface...1 On-line Risk Prediction Tool SW Beta Release 4
5 Terminology Adaptor Communication network MICIE system Ontology model Prediction tool Functional entity of the MICIE system performing data filtering and data format conversion between a CI and its SMGW system Network Infrastructure dedicated to information exchange between CIs A set of cooperating CIs interconnected by a communication infrastructure and organized according to the MICIE system architecture. Model for description of data including object properties, services offered by objects and relationships between objects. It can include rules for semantic inference between objects through a composition of rules. System in the MICIE architecture devoted to risk analysis. Secure Gateway Mediation System in the MICIE architecture devoted to secure communication and data exchange between remote CIs SMGW system Set of coordinated functions enabling secure and reliable data exchange between remote CIs On-line Risk Prediction Tool SW Beta Release 5
6 List of acronyms ACC AD ADSL AES AH API B2B B2C BIT CA CI CISIA CCI CN COPS CPE CPU CRL CSR DB DES DMTF DoS Area Control Centres Adaptor Asymmetric Digital Subscriber Line Advanced Encryption Standard Authentication Header Application Programming Interface Business to Business Business to Customer Built in test Certificate Authority Critical Infrastructure Critical Infrastructure Simulation by Interdependent Agents Communication Critical Infrastructure Communication Network Common Open Policy Service Customer Provider Equipment Central Processing Unit Certificate Revocation List Certificate Signing Request Database Data Encryption Standard Distributed Management Task-Force Denial of Service On-line Risk Prediction Tool SW Beta Release 6
7 EA EC ECI ER ESMGW ESP FSM GAN GENA GPS GUI HTTP HTTPS ICT ICTCI ICT-MC ID IDF IDS IEC IETF IKE IP IPSec IT Electrical CI Adaptor European Commission Electrical Critical Infrastructure Entity-Relationship diagram External SMGW Encapsulating Security Payload Finite State Machine Geographical Area Network General Event Notification Architecture Global Positioning System Graphic User Interface Hypertext Transfer Protocol Hypertext Transfer Protocol over Secure Socket Layer Information and communication Technology Information and communication Technology Critical Infrastructure ICTCI Monitoring Component Identificator Information Discovery Framework Intrusion Detection System Israel Electric Corporation Internet Engineering Task-Force Internet Key Exchange Internet Protocol Internet Protocol Security Information Technology On-line Risk Prediction Tool SW Beta Release 7
8 LAN LDAP MAC MHR MPLS MSC NMS OWL OWL-DL OPC PBN PBNM PC PDP PE PEP PGP PKI PM PT QoS RA RPC RSA RTU Local Area Network Lightweight Directory Access Protocol Message Authentication Code Mixed Holistic-Reductionistic model Multi Protocol Label Switching Message Sequence Chart diagram Network Management System Web Ontology Language Web Ontology Language Description Logic Open Connectivity Policy Based Networking Policy Based Network Management Personal computer Policy Decision Point Personnel Policy Enforcement Point Pretty Good Privacy Public Key Infrastructure Periodic (Scheduled) Maintenance Prediction Tool Quality of Service Registration Authority Remote Procedure Call Rivest Shamir Adleman algorithm Remote Terminal Unit On-line Risk Prediction Tool SW Beta Release 8
9 SA SCADA SLA SLS SMGW SNMP SOAP SP SSH SSL SSDP SW TCP TLCA TLS UDDI UML UPnP UPS UTC VA VPN W3C Wi-Fi WoT Security Association Supervisory Control and Data Acquisition Service Level Agreement Service Level Specification Secure Mediation Gateway Simple Network Management Protocol Simple Object Access Protocol Service Provider Secure SHell Secure Socket Layer Simple Service Discovery Protocol Software Transmission Control Protocol Telecommunication CI Adaptor Transport Layer Security Universal Description Discovery and Integration Unified Modeling Language Universal Plug n Play Uninterruptible Power Supply Coordinated Universal Time Validation Authority Virtual Private Network World Wide Web Consortium Wireless Fidelity Web of Trust On-line Risk Prediction Tool SW Beta Release 9
10 WS WS-Security WSDL XML Web Service Web Services Security Web Service Description Language Extensible Markup Language On-line Risk Prediction Tool SW Beta Release 10
11 1. Introduction This report describes the deployment architecture and the software design of the On-line Risk Prediction Tool. The MICIE system includes a distributed network environment in which heterogeneous CIs exchange information. Each CI in the MICIE system is interconnected through a local SMGW, which provides secure and reliable communication across the MICIE system. Exchange of information among CIs makes it possible to enhance capabilities of risk analysis taking into account CI interdependencies. Each CI has its prediction tool that extract information from field and then calculate the short-term prediction. The prediction tool uses a so-called adaptor to transform the information from the CI control centre in a compatible format with prediction tool input. One of the outputs of MICIE project will be a prototyped tool able to predict, in a distributed way, the state of some services related to two or more interconnected infrastructures. It is our opinion that such forecast will have a deep impact on the management of each infrastructure due to the new capabilities that will be available to the operators of each control room. Capabilities related to a better real-time understanding of crisis scenarios in which will be clear, to all involved people, what is going to happen and what is possible to do with available systems. It is clear that, to have a reasonable emergency management improvement, a real enhancement with respect to a standard isolated scenario, some data will have to be exchanged between control rooms. We also know that in a perfect world, where everything is shared, this would not be a problem. In our real world, some Figure 1 MICIE on-line tool architecture information will be not available to disclosure due to several reasons but, it is our firm opinion that, although some aggregate information, something related to what is going on, and not why, will be useful to mitigate the risk of a worse disaster. On-line Risk Prediction Tool SW Beta Release 11
12 Obviously, the tool inside each infrastructure directly receives only the data originated within its infrastructure. The different tools will be interconnected. The easiest way to grant the consistency of the oberall state stimation by the different distributed tools is to equip every system with a common general model, even if every specific domain receives only a subset of the inputs. We propose that each tool has exactly the same model of the overall system of systems, see Figure 1. The aim of the project is to provide an on-line tool whose architecture is depicted in Figure 1. The communication between two or more prediction tools will be handled by means of Secure Mediation Gateways, which will be completely transparent to the risk prediction tools; moreover each tool will receive data coming from the specific field where the tool is attested by means of an adaptor. Finally the prediction of the future state of the system will be provided to the operators of the infrastructures. On-line Risk Prediction Tool SW Beta Release 12
13 2. On-line risk prediction tool architecture The on-line risk prediction tool is the core element of the system as it includes the module that provide a risk estimation to the CI operators. Figure 2 The on-line risk prediction tool architecture The Error! Reference source not found. shows the architecture of the risk prediction tool. It is composed of five main interrelated modules, each devoted to a specific task: 1. Prediction Module: has the duty to produce a new prediction; 2. Aggregation Module: is devoted to aggregate the predictions coming from other tools, the data coming from the field and the last local prediction, in order to provide an updated input for the prediction module; 3. Filtering Module: is aimed to filter the updated prediction provided by the prediction module, exposing to the Secure Mediation Gateway only the Quaity of Services; 4. Communication Module: is the interface with the Secure Mediation Gateway; 5. Operator Interface Module: is devoted to show operators the prediction provided by the prediction module in an easily understandable view. On-line Risk Prediction Tool SW Beta Release 13
14 2.1 Prediction Module The prediction module is the core of the whole prediction tool; it is based on the MHR-CISIA simulator, which is able to provide a prediction on the future state of the whole system of systems. To this end the simulator requires an input XML file containing the initial condition of each entity and Service. Figure 3 Prediction Module In order to use this simulator in an online framework, there is the need to update such an input file based on the data coming from other PTs and from the field. In the next paragraphs we show an example of input and output files. The input files are four xml documents: Association.xml: the file that contains the association among nets and resources. Every resource that is transmitted on the network is explained with the associated net; Net.xml: the file contains the net with the entity ports and the links among the ports, that are seen as nodes; Entity.xml: the file contains every entity with its type, its name and its ports; Status.xml: the file contains every statusitem of each entity with its fuzzy values. The output file is only one file that contains all the entities and their statusitem with the short-term previsions. The file is named EntityStatuses.xml. This file is not shown due to its length by has the same structure of status.xml repeated for each step of prediction Association.xml <DOCUMENT> <ASSOC> <RESOURCE>DATA_TLC_LINES</RESOURCE> On-line Risk Prediction Tool SW Beta Release 14
15 <NET>1</NET> </ASSOC> <ASSOC> <RESOURCE>ALARM_TLC</RESOURCE> <NET>1</NET> </ASSOC> <ASSOC> <RESOURCE>CONNECTION</RESOURCE> <NET>1</NET> </ASSOC> <ASSOC> <RESOURCE>CURRENT</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>IMPEDANCE</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>ALARM_ELE</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>REPORT</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>BREAKER_STATE</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>LOAD_ALARM</RESOURCE> <NET>2</NET> </ASSOC> </DOCUMENT> Net.xml <DOCUMENT> <NET> <NAME>Rete_TLC</NAME> <TYPE>1</TYPE> <DIM>24</DIM> <NODES> <NODE>2</NODE> <NODE>3</NODE> <NODE>4</NODE> <NODE>5</NODE> On-line Risk Prediction Tool SW Beta Release 15
16 [ ] <NODE>1845</NODE> <NODE>1865</NODE> <NODE>1885</NODE> <NODE>1905</NODE> </NODES> <CONNECTIONS> <CONNECT> <FROM>2</FROM> <TO>22</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3008</FROM> <TO>904</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3009</FROM> <TO>924</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3010</FROM> <TO>944</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3011</FROM> <TO>964</TO> <WEIGHT> <H>1</H> </WEIGHT> On-line Risk Prediction Tool SW Beta Release 16
17 <DELAY>0</DELAY> </CONNECT> [ ] <CONNECT> <FROM>803</FROM> <TO>1825</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>823</FROM> <TO>1845</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>843</FROM> <TO>1865</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>863</FROM> <TO>1885</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>883</FROM> <TO>1905</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> </CONNECTIONS> </NET> On-line Risk Prediction Tool SW Beta Release 17
18 <NET> <NAME>Rete_Ele</NAME> <TYPE>2</TYPE> <DIM>36</DIM> <NODES> <NODE>1282</NODE> <NODE>1283</NODE> <NODE>1284</NODE> <NODE>1285</NODE> [ ] <NODE>2904</NODE> <NODE>2922</NODE> <NODE>2923</NODE> <NODE>2924</NODE> </NODES> <CONNECTIONS> <CONNECT> <FROM>1296</FROM> <TO>1302</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>1297</FROM> <TO>1322</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>1323</FROM> <TO>1664</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>1664</FROM> <TO>1323</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> On-line Risk Prediction Tool SW Beta Release 18
19 [ ] <CONNECT> <FROM>2704</FROM> <TO>1292</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2724</FROM> <TO>1293</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2744</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2764</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2784</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2804</FROM> <TO>1285</TO> <WEIGHT> On-line Risk Prediction Tool SW Beta Release 19
20 <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2824</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2844</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2864</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2884</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2924</FROM> <TO>1287</TO> <WEIGHT> <H>1</H> </WEIGHT> On-line Risk Prediction Tool SW Beta Release 20
21 <DELAY>0</DELAY> </CONNECT> </CONNECTIONS> </NET> </DOCUMENT> Entity.xml <DOCUMENT> <TYPE>TlcHolNode</TYPE> <NAME>TlcHolNode1</NAME> <ID>1</ID> <PORT>1</PORT> <PORT>2</PORT> <PORT>3</PORT> <PORT>4</PORT> <PORT>5</PORT> <PORT>6</PORT> <PORT>7</PORT> <PORT>8</PORT> <PORT>9</PORT> <PORT>10</PORT> <PORT>11</PORT> <PORT>12</PORT> <PORT>13</PORT> <PORT>3002</PORT> <PORT>3003</PORT> <PORT>3004</PORT> <PORT>3005</PORT> <PORT>3006</PORT> <PORT>3007</PORT> <PORT>3008</PORT> <PORT>3009</PORT> <PORT>3010</PORT> <PORT>3011</PORT> <PORT>3012</PORT> <PORT>3013</PORT> <TYPE>RingRoutingService</TYPE> <NAME>RingRoutingService1</NAME> <ID>21</ID> <PORT>21</PORT> <PORT>22</PORT> <PORT>23</PORT> <TYPE>NMS</TYPE> <NAME>NMS1</NAME> <ID>41</ID> <PORT>41</PORT> On-line Risk Prediction Tool SW Beta Release 21
22 <PORT>42</PORT> <PORT>43</PORT> <PORT>44</PORT> <TYPE>TlcNode</TYPE> <NAME>TlcNode1</NAME> <ID>61</ID> <PORT>61</PORT> <PORT>62</PORT> <PORT>63</PORT> <TYPE>TlcNode</TYPE> <NAME>TlcNode2</NAME> <ID>81</ID> <PORT>81</PORT> <PORT>82</PORT> <PORT>83</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode1</NAME> <ID>101</ID> <PORT>101</PORT> <PORT>102</PORT> <PORT>103</PORT> <PORT>104</PORT> <PORT>105</PORT> <PORT>106</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode2</NAME> <ID>121</ID> <PORT>121</PORT> <PORT>122</PORT> <PORT>123</PORT> <PORT>124</PORT> <PORT>125</PORT> <PORT>126</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode3</NAME> <ID>141</ID> <PORT>141</PORT> <PORT>142</PORT> <PORT>143</PORT> <PORT>144</PORT> On-line Risk Prediction Tool SW Beta Release 22
23 <PORT>145</PORT> <PORT>146</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode4</NAME> <ID>161</ID> <PORT>161</PORT> <PORT>162</PORT> <PORT>163</PORT> <PORT>164</PORT> <PORT>165</PORT> <PORT>166</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode5</NAME> <ID>181</ID> <PORT>181</PORT> <PORT>182</PORT> <PORT>183</PORT> <PORT>184</PORT> <PORT>185</PORT> <PORT>186</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode6</NAME> <ID>201</ID> <PORT>201</PORT> <PORT>202</PORT> <PORT>203</PORT> <PORT>204</PORT> <PORT>205</PORT> <PORT>206</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode7</NAME> <ID>221</ID> <PORT>221</PORT> <PORT>222</PORT> <PORT>223</PORT> <PORT>224</PORT> <PORT>225</PORT> <PORT>226</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode8</NAME> <ID>241</ID> On-line Risk Prediction Tool SW Beta Release 23
24 <PORT>241</PORT> <PORT>242</PORT> <PORT>243</PORT> <PORT>244</PORT> <PORT>245</PORT> <PORT>246</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode9</NAME> <ID>261</ID> <PORT>261</PORT> <PORT>262</PORT> <PORT>263</PORT> <PORT>264</PORT> <PORT>265</PORT> <PORT>266</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc1</NAME> <ID>281</ID> <PORT>281</PORT> <PORT>282</PORT> <PORT>283</PORT> <PORT>284</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc2</NAME> <ID>301</ID> <PORT>301</PORT> <PORT>302</PORT> <PORT>303</PORT> <PORT>304</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc3</NAME> <ID>321</ID> <PORT>321</PORT> <PORT>322</PORT> <PORT>323</PORT> <PORT>324</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc4</NAME> <ID>341</ID> On-line Risk Prediction Tool SW Beta Release 24
25 <PORT>341</PORT> <PORT>342</PORT> <PORT>343</PORT> <PORT>344</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc5</NAME> <ID>361</ID> <PORT>361</PORT> <PORT>362</PORT> <PORT>363</PORT> <PORT>364</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc6</NAME> <ID>381</ID> <PORT>381</PORT> <PORT>382</PORT> <PORT>383</PORT> <PORT>384</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc7</NAME> <ID>401</ID> <PORT>401</PORT> <PORT>402</PORT> <PORT>403</PORT> <PORT>404</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc8</NAME> <ID>421</ID> <PORT>421</PORT> <PORT>422</PORT> <PORT>423</PORT> <PORT>424</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc9</NAME> <ID>441</ID> <PORT>441</PORT> <PORT>442</PORT> <PORT>443</PORT> <PORT>444</PORT> On-line Risk Prediction Tool SW Beta Release 25
26 <TYPE>WireTlc</TYPE> <NAME>WireTlc10</NAME> <ID>461</ID> <PORT>461</PORT> <PORT>462</PORT> <PORT>463</PORT> <PORT>464</PORT> <TYPE>Scada</TYPE> <NAME>Scada1</NAME> <ID>481</ID> <PORT>481</PORT> <PORT>482</PORT> <PORT>483</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc11</NAME> <ID>501</ID> <PORT>501</PORT> <PORT>502</PORT> <PORT>503</PORT> <PORT>504</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode1</NAME> <ID>521</ID> <PORT>521</PORT> <PORT>522</PORT> <PORT>523</PORT> <PORT>524</PORT> <PORT>525</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode2</NAME> <ID>541</ID> <PORT>541</PORT> <PORT>542</PORT> <PORT>543</PORT> <PORT>544</PORT> <PORT>545</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode3</NAME> On-line Risk Prediction Tool SW Beta Release 26
27 <ID>561</ID> <PORT>561</PORT> <PORT>562</PORT> <PORT>563</PORT> <PORT>564</PORT> <PORT>565</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode4</NAME> <ID>581</ID> <PORT>581</PORT> <PORT>582</PORT> <PORT>583</PORT> <PORT>584</PORT> <PORT>585</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode5</NAME> <ID>601</ID> <PORT>601</PORT> <PORT>602</PORT> <PORT>603</PORT> <PORT>604</PORT> <PORT>605</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode6</NAME> <ID>621</ID> <PORT>621</PORT> <PORT>622</PORT> <PORT>623</PORT> <PORT>624</PORT> <PORT>625</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode7</NAME> <ID>641</ID> <PORT>641</PORT> <PORT>642</PORT> <PORT>643</PORT> <PORT>644</PORT> <PORT>645</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode8</NAME> On-line Risk Prediction Tool SW Beta Release 27
28 <ID>661</ID> <PORT>661</PORT> <PORT>662</PORT> <PORT>663</PORT> <PORT>664</PORT> <PORT>665</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode9</NAME> <ID>681</ID> <PORT>681</PORT> <PORT>682</PORT> <PORT>683</PORT> <PORT>684</PORT> <PORT>685</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode10</NAME> <ID>701</ID> <PORT>701</PORT> <PORT>702</PORT> <PORT>703</PORT> <PORT>704</PORT> <PORT>705</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode11</NAME> <ID>721</ID> <PORT>721</PORT> <PORT>722</PORT> <PORT>723</PORT> <PORT>724</PORT> <PORT>725</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode12</NAME> <ID>741</ID> <PORT>741</PORT> <PORT>742</PORT> <PORT>743</PORT> <PORT>744</PORT> <PORT>745</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode13</NAME> On-line Risk Prediction Tool SW Beta Release 28
29 <ID>761</ID> <PORT>761</PORT> <PORT>762</PORT> <PORT>763</PORT> <PORT>764</PORT> <PORT>765</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode14</NAME> <ID>781</ID> <PORT>781</PORT> <PORT>782</PORT> <PORT>783</PORT> <PORT>784</PORT> <PORT>785</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode15</NAME> <ID>801</ID> <PORT>801</PORT> <PORT>802</PORT> <PORT>803</PORT> <PORT>804</PORT> <PORT>805</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode16</NAME> <ID>821</ID> <PORT>821</PORT> <PORT>822</PORT> <PORT>823</PORT> <PORT>824</PORT> <PORT>825</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode17</NAME> <ID>841</ID> <PORT>841</PORT> <PORT>842</PORT> <PORT>843</PORT> <PORT>844</PORT> <PORT>845</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode18</NAME> On-line Risk Prediction Tool SW Beta Release 29
30 <ID>861</ID> <PORT>861</PORT> <PORT>862</PORT> <PORT>863</PORT> <PORT>864</PORT> <PORT>865</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode19</NAME> <ID>881</ID> <PORT>881</PORT> <PORT>882</PORT> <PORT>883</PORT> <PORT>884</PORT> <PORT>885</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService1</NAME> <ID>901</ID> <PORT>901</PORT> <PORT>902</PORT> <PORT>903</PORT> <PORT>904</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService2</NAME> <ID>921</ID> <PORT>921</PORT> <PORT>922</PORT> <PORT>923</PORT> <PORT>924</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService3</NAME> <ID>941</ID> <PORT>941</PORT> <PORT>942</PORT> <PORT>943</PORT> <PORT>944</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService4</NAME> <ID>961</ID> <PORT>961</PORT> On-line Risk Prediction Tool SW Beta Release 30
31 <PORT>962</PORT> <PORT>963</PORT> <PORT>964</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService5</NAME> <ID>981</ID> <PORT>981</PORT> <PORT>982</PORT> <PORT>983</PORT> <PORT>984</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService6</NAME> <ID>1001</ID> <PORT>1001</PORT> <PORT>1002</PORT> <PORT>1003</PORT> <PORT>1004</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService7</NAME> <ID>1021</ID> <PORT>1021</PORT> <PORT>1022</PORT> <PORT>1023</PORT> <PORT>1024</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService8</NAME> <ID>1041</ID> <PORT>1041</PORT> <PORT>1042</PORT> <PORT>1043</PORT> <PORT>1044</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService9</NAME> <ID>1061</ID> <PORT>1061</PORT> <PORT>1062</PORT> <PORT>1063</PORT> <PORT>1064</PORT> On-line Risk Prediction Tool SW Beta Release 31
32 <TYPE>ConnectionService</TYPE> <NAME>ConnectionService10</NAME> <ID>1081</ID> <PORT>1081</PORT> <PORT>1082</PORT> <PORT>1083</PORT> <PORT>1084</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService11</NAME> <ID>1101</ID> <PORT>1101</PORT> <PORT>1102</PORT> <PORT>1103</PORT> <PORT>1104</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService12</NAME> <ID>1121</ID> <PORT>1121</PORT> <PORT>1122</PORT> <PORT>1123</PORT> <PORT>1124</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService13</NAME> <ID>1141</ID> <PORT>1141</PORT> <PORT>1142</PORT> <PORT>1143</PORT> <PORT>1144</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService14</NAME> <ID>1161</ID> <PORT>1161</PORT> <PORT>1162</PORT> <PORT>1163</PORT> <PORT>1164</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService15</NAME> <ID>1181</ID> On-line Risk Prediction Tool SW Beta Release 32
33 <PORT>1181</PORT> <PORT>1182</PORT> <PORT>1183</PORT> <PORT>1184</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService16</NAME> <ID>1201</ID> <PORT>1201</PORT> <PORT>1202</PORT> <PORT>1203</PORT> <PORT>1204</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService17</NAME> <ID>1221</ID> <PORT>1221</PORT> <PORT>1222</PORT> <PORT>1223</PORT> <PORT>1224</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService18</NAME> <ID>1241</ID> <PORT>1241</PORT> <PORT>1242</PORT> <PORT>1243</PORT> <PORT>1244</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService19</NAME> <ID>1261</ID> <PORT>1261</PORT> <PORT>1262</PORT> <PORT>1263</PORT> <PORT>1264</PORT> <TYPE>EleHolNode</TYPE> <NAME>EleHolNode1</NAME> <ID>1281</ID> <PORT>1281</PORT> <PORT>1282</PORT> <PORT>1283</PORT> <PORT>1284</PORT> <PORT>1285</PORT> On-line Risk Prediction Tool SW Beta Release 33
34 <PORT>1286</PORT> <PORT>1287</PORT> <PORT>1288</PORT> <PORT>1289</PORT> <PORT>1290</PORT> <PORT>1291</PORT> <PORT>1292</PORT> <PORT>1293</PORT> <PORT>1294</PORT> <PORT>1295</PORT> <PORT>1296</PORT> <PORT>1297</PORT> <TYPE>ReportService</TYPE> <NAME>ReportService1</NAME> <ID>1301</ID> <PORT>1301</PORT> <PORT>1302</PORT> <TYPE>FisrService</TYPE> <NAME>FisrService1</NAME> <ID>1321</ID> <PORT>1321</PORT> <PORT>1322</PORT> <PORT>1323</PORT> <PORT>1324</PORT> <PORT>1325</PORT> <PORT>1326</PORT> <PORT>1327</PORT> <PORT>1328</PORT> <PORT>1329</PORT> <PORT>1330</PORT> <PORT>1331</PORT> <PORT>1332</PORT> <PORT>1333</PORT> <PORT>1334</PORT> <PORT>1335</PORT> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation1</NAME> <ID>1341</ID> <PORT>1341</PORT> <PORT>1342</PORT> <PORT>1343</PORT> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation2</NAME> <ID>1361</ID> On-line Risk Prediction Tool SW Beta Release 34
35 <PORT>1361</PORT> <PORT>1362</PORT> <PORT>1363</PORT> <TYPE>Joint</TYPE> <NAME>Joint1</NAME> <ID>1381</ID> <PORT>1381</PORT> <PORT>1382</PORT> <PORT>1383</PORT> <PORT>1384</PORT> <PORT>1385</PORT> <TYPE>Joint</TYPE> <NAME>Joint2</NAME> <ID>1401</ID> <PORT>1401</PORT> <PORT>1402</PORT> <PORT>1403</PORT> <PORT>1404</PORT> <PORT>1405</PORT> <TYPE>Joint</TYPE> <NAME>Joint3</NAME> <ID>1421</ID> <PORT>1421</PORT> <PORT>1422</PORT> <PORT>1423</PORT> <PORT>1424</PORT> <PORT>1425</PORT> <TYPE>Joint</TYPE> <NAME>Joint4</NAME> <ID>1441</ID> <PORT>1441</PORT> <PORT>1442</PORT> <PORT>1443</PORT> <PORT>1444</PORT> <PORT>1445</PORT> <TYPE>Joint</TYPE> <NAME>Joint5</NAME> <ID>1461</ID> <PORT>1461</PORT> <PORT>1462</PORT> On-line Risk Prediction Tool SW Beta Release 35
36 <PORT>1463</PORT> <PORT>1464</PORT> <PORT>1465</PORT> <TYPE>Joint</TYPE> <NAME>Joint6</NAME> <ID>1481</ID> <PORT>1481</PORT> <PORT>1482</PORT> <PORT>1483</PORT> <PORT>1484</PORT> <PORT>1485</PORT> <TYPE>Joint</TYPE> <NAME>Joint7</NAME> <ID>1501</ID> <PORT>1501</PORT> <PORT>1502</PORT> <PORT>1503</PORT> <PORT>1504</PORT> <PORT>1505</PORT> <TYPE>Joint</TYPE> <NAME>Joint8</NAME> <ID>1521</ID> <PORT>1521</PORT> <PORT>1522</PORT> <PORT>1523</PORT> <PORT>1524</PORT> <PORT>1525</PORT> <TYPE>Joint</TYPE> <NAME>Joint9</NAME> <ID>1541</ID> <PORT>1541</PORT> <PORT>1542</PORT> <PORT>1543</PORT> <PORT>1544</PORT> <PORT>1545</PORT> <TYPE>Joint</TYPE> <NAME>Joint10</NAME> <ID>1561</ID> <PORT>1561</PORT> <PORT>1562</PORT> On-line Risk Prediction Tool SW Beta Release 36
37 <PORT>1563</PORT> <PORT>1564</PORT> <PORT>1565</PORT> <TYPE>Joint</TYPE> <NAME>Joint11</NAME> <ID>1581</ID> <PORT>1581</PORT> <PORT>1582</PORT> <PORT>1583</PORT> <PORT>1584</PORT> <PORT>1585</PORT> <TYPE>Joint</TYPE> <NAME>Joint12</NAME> <ID>1601</ID> <PORT>1601</PORT> <PORT>1602</PORT> <PORT>1603</PORT> <PORT>1604</PORT> <PORT>1605</PORT> <TYPE>Joint</TYPE> <NAME>Joint13</NAME> <ID>1621</ID> <PORT>1621</PORT> <PORT>1622</PORT> <PORT>1623</PORT> <PORT>1624</PORT> <PORT>1625</PORT> <TYPE>Joint</TYPE> <NAME>Joint14</NAME> <ID>1641</ID> <PORT>1641</PORT> <PORT>1642</PORT> <PORT>1643</PORT> <PORT>1644</PORT> <PORT>1645</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker1</NAME> <ID>1661</ID> <PORT>1661</PORT> <PORT>1662</PORT> On-line Risk Prediction Tool SW Beta Release 37
38 <PORT>1663</PORT> <PORT>1664</PORT> <PORT>1665</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker2</NAME> <ID>1681</ID> <PORT>1681</PORT> <PORT>1682</PORT> <PORT>1683</PORT> <PORT>1684</PORT> <PORT>1685</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker3</NAME> <ID>1701</ID> <PORT>1701</PORT> <PORT>1702</PORT> <PORT>1703</PORT> <PORT>1704</PORT> <PORT>1705</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker4</NAME> <ID>1721</ID> <PORT>1721</PORT> <PORT>1722</PORT> <PORT>1723</PORT> <PORT>1724</PORT> <PORT>1725</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker5</NAME> <ID>1741</ID> <PORT>1741</PORT> <PORT>1742</PORT> <PORT>1743</PORT> <PORT>1744</PORT> <PORT>1745</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker6</NAME> <ID>1761</ID> <PORT>1761</PORT> <PORT>1762</PORT> On-line Risk Prediction Tool SW Beta Release 38
39 <PORT>1763</PORT> <PORT>1764</PORT> <PORT>1765</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker7</NAME> <ID>1781</ID> <PORT>1781</PORT> <PORT>1782</PORT> <PORT>1783</PORT> <PORT>1784</PORT> <PORT>1785</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker8</NAME> <ID>1801</ID> <PORT>1801</PORT> <PORT>1802</PORT> <PORT>1803</PORT> <PORT>1804</PORT> <PORT>1805</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker9</NAME> <ID>1821</ID> <PORT>1821</PORT> <PORT>1822</PORT> <PORT>1823</PORT> <PORT>1824</PORT> <PORT>1825</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker10</NAME> <ID>1841</ID> <PORT>1841</PORT> <PORT>1842</PORT> <PORT>1843</PORT> <PORT>1844</PORT> <PORT>1845</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker11</NAME> <ID>1861</ID> <PORT>1861</PORT> <PORT>1862</PORT> On-line Risk Prediction Tool SW Beta Release 39
40 <PORT>1863</PORT> <PORT>1864</PORT> <PORT>1865</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker12</NAME> <ID>1881</ID> <PORT>1881</PORT> <PORT>1882</PORT> <PORT>1883</PORT> <PORT>1884</PORT> <PORT>1885</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker13</NAME> <ID>1901</ID> <PORT>1901</PORT> <PORT>1902</PORT> <PORT>1903</PORT> <PORT>1904</PORT> <PORT>1905</PORT> <TYPE>Load</TYPE> <NAME>Load1</NAME> <ID>1921</ID> <PORT>1921</PORT> <PORT>1922</PORT> <PORT>1923</PORT> <TYPE>Load</TYPE> <NAME>Load2</NAME> <ID>1941</ID> <PORT>1941</PORT> <PORT>1942</PORT> <PORT>1943</PORT> <TYPE>Load</TYPE> <NAME>Load3</NAME> <ID>1961</ID> <PORT>1961</PORT> <PORT>1962</PORT> <PORT>1963</PORT> On-line Risk Prediction Tool SW Beta Release 40
41 <TYPE>Load</TYPE> <NAME>Load4</NAME> <ID>1981</ID> <PORT>1981</PORT> <PORT>1982</PORT> <PORT>1983</PORT> <TYPE>Load</TYPE> <NAME>Load5</NAME> <ID>2001</ID> <PORT>2001</PORT> <PORT>2002</PORT> <PORT>2003</PORT> <TYPE>Load</TYPE> <NAME>Load6</NAME> <ID>2021</ID> <PORT>2021</PORT> <PORT>2022</PORT> <PORT>2023</PORT> <TYPE>Load</TYPE> <NAME>Load7</NAME> <ID>2041</ID> <PORT>2041</PORT> <PORT>2042</PORT> <PORT>2043</PORT> <TYPE>Load</TYPE> <NAME>Load8</NAME> <ID>2061</ID> <PORT>2061</PORT> <PORT>2062</PORT> <PORT>2063</PORT> <TYPE>Load</TYPE> <NAME>Load9</NAME> <ID>2081</ID> <PORT>2081</PORT> <PORT>2082</PORT> <PORT>2083</PORT> On-line Risk Prediction Tool SW Beta Release 41
42 <TYPE>Load</TYPE> <NAME>Load10</NAME> <ID>2101</ID> <PORT>2101</PORT> <PORT>2102</PORT> <PORT>2103</PORT> <TYPE>Load</TYPE> <NAME>Load11</NAME> <ID>2121</ID> <PORT>2121</PORT> <PORT>2122</PORT> <PORT>2123</PORT> <TYPE>Load</TYPE> <NAME>Load12</NAME> <ID>2141</ID> <PORT>2141</PORT> <PORT>2142</PORT> <PORT>2143</PORT> <TYPE>Load</TYPE> <NAME>Load13</NAME> <ID>2161</ID> <PORT>2161</PORT> <PORT>2162</PORT> <PORT>2163</PORT> <TYPE>Load</TYPE> <NAME>Load14</NAME> <ID>2181</ID> <PORT>2181</PORT> <PORT>2182</PORT> <PORT>2183</PORT> <TYPE>Wire</TYPE> <NAME>Wire1</NAME> <ID>2201</ID> <PORT>2201</PORT> <PORT>2202</PORT> <PORT>2203</PORT> <PORT>2204</PORT> On-line Risk Prediction Tool SW Beta Release 42
43 <TYPE>Wire</TYPE> <NAME>Wire2</NAME> <ID>2221</ID> <PORT>2221</PORT> <PORT>2222</PORT> <PORT>2223</PORT> <PORT>2224</PORT> <TYPE>Wire</TYPE> <NAME>Wire3</NAME> <ID>2241</ID> <PORT>2241</PORT> <PORT>2242</PORT> <PORT>2243</PORT> <PORT>2244</PORT> <TYPE>Wire</TYPE> <NAME>Wire4</NAME> <ID>2261</ID> <PORT>2261</PORT> <PORT>2262</PORT> <PORT>2263</PORT> <PORT>2264</PORT> <TYPE>Wire</TYPE> <NAME>Wire5</NAME> <ID>2281</ID> <PORT>2281</PORT> <PORT>2282</PORT> <PORT>2283</PORT> <PORT>2284</PORT> [ ] <TYPE>Wire</TYPE> <NAME>Wire35</NAME> <ID>2881</ID> <PORT>2881</PORT> <PORT>2882</PORT> <PORT>2883</PORT> <PORT>2884</PORT> <TYPE>Wire</TYPE> <NAME>Wire36</NAME> <ID>2901</ID> On-line Risk Prediction Tool SW Beta Release 43
44 <PORT>2901</PORT> <PORT>2902</PORT> <PORT>2903</PORT> <PORT>2904</PORT> <TYPE>Wire</TYPE> <NAME>Wire37</NAME> <ID>2921</ID> <PORT>2921</PORT> <PORT>2922</PORT> <PORT>2923</PORT> <PORT>2924</PORT> </DOCUMENT> Status.xml <DOCUMENT> <TYPE>TlcHolNode</TYPE> <NAME>TlcHolNode1</NAME> <NAME>fault_ring_wire</NAME> <NAME>tlc_oper</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 44
45 <L> </L> <M> </M> <R> </R> <TYPE>RingRoutingService</TYPE> <NAME>RingRoutingService1</NAME> <NAME>fault_ring_wire</NAME> <TYPE>NMS</TYPE> <NAME>NMS1</NAME> <NAME>fault_ring_wire</NAME> <TYPE>TlcNode</TYPE> <NAME>TlcNode1</NAME> On-line Risk Prediction Tool SW Beta Release 45
46 <TYPE>TlcNode</TYPE> <NAME>TlcNode2</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode1</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> On-line Risk Prediction Tool SW Beta Release 46
47 <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode2</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 47
48 <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode3</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 48
49 <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode4</NAME> <NAME>update</NAME> <NAME>n2s</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode5</NAME> On-line Risk Prediction Tool SW Beta Release 49
50 <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode6</NAME> <NAME>n2s</NAME> On-line Risk Prediction Tool SW Beta Release 50
51 <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode7</NAME> <NAME>update</NAME> <NAME>n2s</NAME> On-line Risk Prediction Tool SW Beta Release 51
52 <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode8</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> On-line Risk Prediction Tool SW Beta Release 52
53 <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode9</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 53
54 <TYPE>WireTlc</TYPE> <NAME>WireTlc1</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc2</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc3</NAME> On-line Risk Prediction Tool SW Beta Release 54
55 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc4</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc5</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 55
56 <TYPE>WireTlc</TYPE> <NAME>WireTlc6</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc7</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc8</NAME> On-line Risk Prediction Tool SW Beta Release 56
57 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc9</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc10</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 57
58 <TYPE>WireTlc</TYPE> <NAME>WireTlc11</NAME> <NAME>mechanical_fault</NAME> <TYPE>Scada</TYPE> <NAME>Scada1</NAME> <NAME>conn_to_rtu</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 58
59 <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode1</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode2</NAME> On-line Risk Prediction Tool SW Beta Release 59
60 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode3</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 60
61 <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode4</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 61
62 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode5</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 62
63 <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode6</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> On-line Risk Prediction Tool SW Beta Release 63
64 <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode7</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 64
65 <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode8</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode9</NAME> On-line Risk Prediction Tool SW Beta Release 65
66 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode10</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 66
67 <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode11</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 67
68 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode12</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> On-line Risk Prediction Tool SW Beta Release 68
69 <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode13</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> On-line Risk Prediction Tool SW Beta Release 69
70 <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode14</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode15</NAME> On-line Risk Prediction Tool SW Beta Release 70
71 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode16</NAME> On-line Risk Prediction Tool SW Beta Release 71
72 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode17</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 72
73 <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode18</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 73
74 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode19</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 74
75 <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService1</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 75
76 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService2</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService3</NAME> On-line Risk Prediction Tool SW Beta Release 76
77 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService4</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 77
78 <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService5</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> On-line Risk Prediction Tool SW Beta Release 78
79 <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService6</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> On-line Risk Prediction Tool SW Beta Release 79
80 <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService7</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 80
81 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService8</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 81
82 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService9</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService10</NAME> On-line Risk Prediction Tool SW Beta Release 82
83 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService11</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 83
84 <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService12</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> On-line Risk Prediction Tool SW Beta Release 84
85 <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService13</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> On-line Risk Prediction Tool SW Beta Release 85
86 <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService14</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 86
87 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService15</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService16</NAME> On-line Risk Prediction Tool SW Beta Release 87
88 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService17</NAME> On-line Risk Prediction Tool SW Beta Release 88
89 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService18</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 89
90 <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService19</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> On-line Risk Prediction Tool SW Beta Release 90
91 <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>EleHolNode</TYPE> <NAME>EleHolNode1</NAME> <NAME>reporting</NAME> <NAME>ele_fault</NAME> <TYPE>ReportService</TYPE> <NAME>ReportService1</NAME> On-line Risk Prediction Tool SW Beta Release 91
92 <NAME>reporting</NAME> <TYPE>FisrService</TYPE> <NAME>FisrService1</NAME> <NAME>reconfig</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfig_start</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation1</NAME> On-line Risk Prediction Tool SW Beta Release 92
93 <NAME>Telecontrolled</NAME> <NAME>NominalSecondaryVoltage</NAME> <L>22000</L> <M>22000</M> <R>22000</R> <NAME>CurrentThreshold</NAME> <L> </L> <M> </M> <R> </R> <NAME>breaker_fault</NAME> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation2</NAME> <NAME>Telecontrolled</NAME> On-line Risk Prediction Tool SW Beta Release 93
94 <NAME>NominalSecondaryVoltage</NAME> <L>22000</L> <M>22000</M> <R>22000</R> <NAME>CurrentThreshold</NAME> <L> </L> <M> </M> <R> </R> <NAME>breaker_fault</NAME> <TYPE>Joint</TYPE> <NAME>Joint1</NAME> <TYPE>Joint</TYPE> <NAME>Joint2</NAME> On-line Risk Prediction Tool SW Beta Release 94
95 <TYPE>Joint</TYPE> <NAME>Joint3</NAME> <TYPE>Joint</TYPE> <NAME>Joint4</NAME> <TYPE>Joint</TYPE> <NAME>Joint5</NAME> <TYPE>Joint</TYPE> <NAME>Joint6</NAME> On-line Risk Prediction Tool SW Beta Release 95
96 <TYPE>Joint</TYPE> <NAME>Joint7</NAME> <TYPE>Joint</TYPE> <NAME>Joint8</NAME> <TYPE>Joint</TYPE> <NAME>Joint9</NAME> <TYPE>Joint</TYPE> <NAME>Joint10</NAME> On-line Risk Prediction Tool SW Beta Release 96
97 <TYPE>Joint</TYPE> <NAME>Joint11</NAME> <TYPE>Joint</TYPE> <NAME>Joint12</NAME> <TYPE>Joint</TYPE> <NAME>Joint13</NAME> <TYPE>Joint</TYPE> <NAME>Joint14</NAME> On-line Risk Prediction Tool SW Beta Release 97
98 <TYPE>Breaker</TYPE> <NAME>Breaker1</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker2</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> On-line Risk Prediction Tool SW Beta Release 98
99 <TYPE>Breaker</TYPE> <NAME>Breaker3</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker4</NAME> <NAME>internal_impedance</NAME> On-line Risk Prediction Tool SW Beta Release 99
100 <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Breaker</TYPE> <NAME>Breaker5</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker6</NAME> On-line Risk Prediction Tool SW Beta Release 100
101 <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker7</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Breaker</TYPE> <NAME>Breaker8</NAME> On-line Risk Prediction Tool SW Beta Release 101
102 <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker9</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 102
103 <TYPE>Breaker</TYPE> <NAME>Breaker10</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Breaker</TYPE> <NAME>Breaker11</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> On-line Risk Prediction Tool SW Beta Release 103
104 <TYPE>Breaker</TYPE> <NAME>Breaker12</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker13</NAME> <NAME>internal_impedance</NAME> On-line Risk Prediction Tool SW Beta Release 104
105 <NAME>breaker_state</NAME> <TYPE>Load</TYPE> <NAME>Load1</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>internal_impedance</NAME> <L> </L> <M> </M> <R> </R> <NAME>voltage</NAME> <L> </L> <M> </M> <R> </R> <TYPE>Load</TYPE> <NAME>Load2</NAME> On-line Risk Prediction Tool SW Beta Release 105
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More information(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
More informationAPNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &
More informationNetwork Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationOn the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks
CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro psimoes@dei.uc.pt
More informationPROJECT FINAL REPORT
PROJECT FINAL REPORT Grant Agreement number: 225353 Project acronym: MICIE Project title: Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationThis Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
More informationChapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
More informationCOTS SECURITY GUIDANCE (CSG) VOICE OVER INTERNET PROTOCOL (VoIP)
COTS SECURITY GUIDANCE (CSG) VOICE OVER INTERNET PROTOCOL (VoIP) CSG-04\G August This page intentionally left blank. Foreword The Voiceover Internet Protocol (CSG-04\G) is an unclassified publication,
More informationQAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationSite to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
More informationIntegrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it
Integrated On-Line Risk Prediction: Think Globally and Act Locally Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Final Workshop Rome, December 16th, 2014 Motivation and Background Power Grid Operating
More informationChapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
More informationCS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationNetwork Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
More informationOther VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
More informationTable of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
More informationPRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
More informationProtocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
More informationComparison of Routable Control System Security Approaches
PNNL-20531 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Comparison of Routable Control System Security Approaches TW Edgar MD Hadley TE Carroll DO Manz JD Winn June 2011
More information1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
More informationCCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
More informationVPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
More informationLecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
More informationNetwork Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
More informationOntological Identification of Patterns for Choreographing Business Workflow
University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business
More informationCornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
More informationAnnual review FLORENCE 2013. WP4 Network: prototypes
Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and
More informationNIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
More informationInternet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
More informationUniversity of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es. University of Murcia SPAIN
University of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es University of Murcia SPAIN Network Security in IPv6 IPv6 IPsec/IKE Implementations UMU-PKIv6 Policy-Based Network Management (PBNM)
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
More informationINF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationAPNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0
APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
More informationSecurity in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
More informationCS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationSecurity Services on IPv6 Networks: PKIv6 and IPv6-VPNs
Security Services on IPv6 Networks: PKIv6 and IPv6-VPNs Antonio F. Gómez Skarmeta University of Murcia SPAIN 1Year Subactivity Description Mobility on IPv6 networks Going to be coordinated
More informationEXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
More informationRelease: 1. ICANWK502A Implement secure encryption technologies
Release: 1 ICANWK502A Implement secure encryption technologies ICANWK502A Implement secure encryption technologies Modification History Release Release 1 Comments This Unit first released with ICA11 Information
More informationSetup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
More informationHow To Protect Critical Infrastructure From Attack
Trust and Reputation Management for Critical Infrastructure Protection Filipe Caldeira 12, Edmundo Monteiro 1, and Paulo Simões 1 1 Universidade de Coimbra - DEI/CISUC, Coimbra, 3030-290, Portugal {fmanuel,edmundo,psimoes}@dei.uc.pt
More informationEUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
More informationDRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
More informationOutline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
More informationLecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
More informationSecurity Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationSecure Use of the New NHS Network (N3): Good Practice Guidelines
Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version
More informationVPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Q&A VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers OVERVIEW Q. What is a VPN? A. A VPN, or virtual private network, delivers the benefits of private network security,
More informationRelease Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
More informationAsheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
More informationThe BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
More informationGigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011
Gigaset IP and IP-PRO Phones Provisioning / Remote Management last modifications by J. Stahl, Bocholt, January the 18 th 2011 Agenda Provisioning / Remote Management for Gigaset IP phones Introduction
More informationAppendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
More informationProducts that are referred to in this document may be trademarks and/or registered trademarks of the respective owners.
2015 GEOVAP, spol. s r. o. All rights reserved. GEOVAP, spol. s r. o. Cechovo nabrezi 1790 530 03 Pardubice Czech Republic +420 466 024 618 http://www.geovap.cz Products that are referred to in this document
More informationTransport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
More informationData Sheet. NCP Secure Enterprise Management. General description. Highlights
Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server
More informationService Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
More informationCS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
More informationAccellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
More informationSSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
More informationPKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240
PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,
More informationACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
More informationMeasurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More information13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
More informationTABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationEDA 1200 4.3 Training Programs. Catalog of Course Descriptions
EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND
More information<Insert Picture Here> Oracle Web Services Manager (WSM)
Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction
More informationThe basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
More informationHuawei Remote Access Security Solution for Enterprise Networks. -Secure and Stable Platforms for Network Interconnection and Data Interaction
Huawei Remote Access Security Solution for Enterprise Networks -Secure and Stable Platforms for Network Interconnection and Data Interaction HUAWEI TECHNOLOGIES CO., LTD. Huawei Remote Access Security
More informationBuilding Robust Security Solutions Using Layering And Independence
Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate
More informationSophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationVirtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance
Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Johnnie Chen Project Manager of Network Security Group Network Benchmarking Lab Network Benchmarking Laboratory
More informationInformation Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationUnifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
More informationHow To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
More informationRelease Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More information3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
More informationOPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationPublic-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
More informationIntroduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationOptus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
More informationBeamYourScreen Security
BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...
More informationQuality Model for Web Services
Quality Model for Web Services September 2005 Document identifier: WSQM -2.0 Location: Editor: Eunju Kim (NCA), Youngkon Lee (KOREA Polytechnic University) Abstract: The purpose of this document is to
More informationWeb Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
More informationConfiguring an IPSec Tunnel between a Firebox & a Check Point FireWall-1
Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later)
More information