Small or Medium scale focused research project STREP MICIE

Size: px
Start display at page:

Download "Small or Medium scale focused research project STREP MICIE"

Transcription

1 FP7-ICT-SEC ICT-SEC MICIE Small or Medium scale focused research project STREP MICIE Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures Grant agreement no.: WP5000 Secure Mediation Gateway D5.1 On-line Risk Prediction Tool SW Beta Release Submission date: 30/11/2010 Organisation name of lead contractor for this deliverable: SELEX COMMS Dissemination Level PU Public Start date of project: 01 September 2008 Duration: 30 months

2 Editor Authors Stefano Panzieri ROMA3 SCOM, CRPHT, ROMA3, PIAP Work package WP5000 Tasks 5001 Internal Review Approval Date On-line Risk Prediction Tool SW Beta Release 2

3 Table of Contents Table of Contents...3 List of Figures...4 Terminology...5 List of acronyms Introduction On-line risk prediction tool architecture Prediction Module Association.xml Net.xml Entity.xml Status.xml Aggregation Module Merge.xml Filter Module Filter.java Communication Module Package org.me.cisiawebservice Package MicieClient Operator Interface Module From Xml to TAG Database C# Program From TAG Database to Xml C# Program On-line Risk Prediction Tool SW Beta Release 3

4 List of Figures Figure 1 MICIE on-line tool architecture...1 Figure 2 The on-line risk prediction tool architecture...1 Figure 3 Prediction Module...1 Figure 4 Aggregation Module Architecture...1 Figure 5 Filtering Module Architecture...1 Figure 6 Communication Module Architecture...1 Figure 7 UML diagram for the risk prediction web service...1 Figure 8 UML diagram for risk prediction web client...1 Figure 9 Operator Interface...1 Figure 10 ifix Architecture...1 Figure 11 The electric operator interface...1 Figure 12 The telecommunication operator interface...1 Figure 13 The service layer interface...1 Figure 14 The medium voltage grid interface...1 Figure 15 The telecommunication network interface...1 Figure 16 The SCADA system interface...1 On-line Risk Prediction Tool SW Beta Release 4

5 Terminology Adaptor Communication network MICIE system Ontology model Prediction tool Functional entity of the MICIE system performing data filtering and data format conversion between a CI and its SMGW system Network Infrastructure dedicated to information exchange between CIs A set of cooperating CIs interconnected by a communication infrastructure and organized according to the MICIE system architecture. Model for description of data including object properties, services offered by objects and relationships between objects. It can include rules for semantic inference between objects through a composition of rules. System in the MICIE architecture devoted to risk analysis. Secure Gateway Mediation System in the MICIE architecture devoted to secure communication and data exchange between remote CIs SMGW system Set of coordinated functions enabling secure and reliable data exchange between remote CIs On-line Risk Prediction Tool SW Beta Release 5

6 List of acronyms ACC AD ADSL AES AH API B2B B2C BIT CA CI CISIA CCI CN COPS CPE CPU CRL CSR DB DES DMTF DoS Area Control Centres Adaptor Asymmetric Digital Subscriber Line Advanced Encryption Standard Authentication Header Application Programming Interface Business to Business Business to Customer Built in test Certificate Authority Critical Infrastructure Critical Infrastructure Simulation by Interdependent Agents Communication Critical Infrastructure Communication Network Common Open Policy Service Customer Provider Equipment Central Processing Unit Certificate Revocation List Certificate Signing Request Database Data Encryption Standard Distributed Management Task-Force Denial of Service On-line Risk Prediction Tool SW Beta Release 6

7 EA EC ECI ER ESMGW ESP FSM GAN GENA GPS GUI HTTP HTTPS ICT ICTCI ICT-MC ID IDF IDS IEC IETF IKE IP IPSec IT Electrical CI Adaptor European Commission Electrical Critical Infrastructure Entity-Relationship diagram External SMGW Encapsulating Security Payload Finite State Machine Geographical Area Network General Event Notification Architecture Global Positioning System Graphic User Interface Hypertext Transfer Protocol Hypertext Transfer Protocol over Secure Socket Layer Information and communication Technology Information and communication Technology Critical Infrastructure ICTCI Monitoring Component Identificator Information Discovery Framework Intrusion Detection System Israel Electric Corporation Internet Engineering Task-Force Internet Key Exchange Internet Protocol Internet Protocol Security Information Technology On-line Risk Prediction Tool SW Beta Release 7

8 LAN LDAP MAC MHR MPLS MSC NMS OWL OWL-DL OPC PBN PBNM PC PDP PE PEP PGP PKI PM PT QoS RA RPC RSA RTU Local Area Network Lightweight Directory Access Protocol Message Authentication Code Mixed Holistic-Reductionistic model Multi Protocol Label Switching Message Sequence Chart diagram Network Management System Web Ontology Language Web Ontology Language Description Logic Open Connectivity Policy Based Networking Policy Based Network Management Personal computer Policy Decision Point Personnel Policy Enforcement Point Pretty Good Privacy Public Key Infrastructure Periodic (Scheduled) Maintenance Prediction Tool Quality of Service Registration Authority Remote Procedure Call Rivest Shamir Adleman algorithm Remote Terminal Unit On-line Risk Prediction Tool SW Beta Release 8

9 SA SCADA SLA SLS SMGW SNMP SOAP SP SSH SSL SSDP SW TCP TLCA TLS UDDI UML UPnP UPS UTC VA VPN W3C Wi-Fi WoT Security Association Supervisory Control and Data Acquisition Service Level Agreement Service Level Specification Secure Mediation Gateway Simple Network Management Protocol Simple Object Access Protocol Service Provider Secure SHell Secure Socket Layer Simple Service Discovery Protocol Software Transmission Control Protocol Telecommunication CI Adaptor Transport Layer Security Universal Description Discovery and Integration Unified Modeling Language Universal Plug n Play Uninterruptible Power Supply Coordinated Universal Time Validation Authority Virtual Private Network World Wide Web Consortium Wireless Fidelity Web of Trust On-line Risk Prediction Tool SW Beta Release 9

10 WS WS-Security WSDL XML Web Service Web Services Security Web Service Description Language Extensible Markup Language On-line Risk Prediction Tool SW Beta Release 10

11 1. Introduction This report describes the deployment architecture and the software design of the On-line Risk Prediction Tool. The MICIE system includes a distributed network environment in which heterogeneous CIs exchange information. Each CI in the MICIE system is interconnected through a local SMGW, which provides secure and reliable communication across the MICIE system. Exchange of information among CIs makes it possible to enhance capabilities of risk analysis taking into account CI interdependencies. Each CI has its prediction tool that extract information from field and then calculate the short-term prediction. The prediction tool uses a so-called adaptor to transform the information from the CI control centre in a compatible format with prediction tool input. One of the outputs of MICIE project will be a prototyped tool able to predict, in a distributed way, the state of some services related to two or more interconnected infrastructures. It is our opinion that such forecast will have a deep impact on the management of each infrastructure due to the new capabilities that will be available to the operators of each control room. Capabilities related to a better real-time understanding of crisis scenarios in which will be clear, to all involved people, what is going to happen and what is possible to do with available systems. It is clear that, to have a reasonable emergency management improvement, a real enhancement with respect to a standard isolated scenario, some data will have to be exchanged between control rooms. We also know that in a perfect world, where everything is shared, this would not be a problem. In our real world, some Figure 1 MICIE on-line tool architecture information will be not available to disclosure due to several reasons but, it is our firm opinion that, although some aggregate information, something related to what is going on, and not why, will be useful to mitigate the risk of a worse disaster. On-line Risk Prediction Tool SW Beta Release 11

12 Obviously, the tool inside each infrastructure directly receives only the data originated within its infrastructure. The different tools will be interconnected. The easiest way to grant the consistency of the oberall state stimation by the different distributed tools is to equip every system with a common general model, even if every specific domain receives only a subset of the inputs. We propose that each tool has exactly the same model of the overall system of systems, see Figure 1. The aim of the project is to provide an on-line tool whose architecture is depicted in Figure 1. The communication between two or more prediction tools will be handled by means of Secure Mediation Gateways, which will be completely transparent to the risk prediction tools; moreover each tool will receive data coming from the specific field where the tool is attested by means of an adaptor. Finally the prediction of the future state of the system will be provided to the operators of the infrastructures. On-line Risk Prediction Tool SW Beta Release 12

13 2. On-line risk prediction tool architecture The on-line risk prediction tool is the core element of the system as it includes the module that provide a risk estimation to the CI operators. Figure 2 The on-line risk prediction tool architecture The Error! Reference source not found. shows the architecture of the risk prediction tool. It is composed of five main interrelated modules, each devoted to a specific task: 1. Prediction Module: has the duty to produce a new prediction; 2. Aggregation Module: is devoted to aggregate the predictions coming from other tools, the data coming from the field and the last local prediction, in order to provide an updated input for the prediction module; 3. Filtering Module: is aimed to filter the updated prediction provided by the prediction module, exposing to the Secure Mediation Gateway only the Quaity of Services; 4. Communication Module: is the interface with the Secure Mediation Gateway; 5. Operator Interface Module: is devoted to show operators the prediction provided by the prediction module in an easily understandable view. On-line Risk Prediction Tool SW Beta Release 13

14 2.1 Prediction Module The prediction module is the core of the whole prediction tool; it is based on the MHR-CISIA simulator, which is able to provide a prediction on the future state of the whole system of systems. To this end the simulator requires an input XML file containing the initial condition of each entity and Service. Figure 3 Prediction Module In order to use this simulator in an online framework, there is the need to update such an input file based on the data coming from other PTs and from the field. In the next paragraphs we show an example of input and output files. The input files are four xml documents: Association.xml: the file that contains the association among nets and resources. Every resource that is transmitted on the network is explained with the associated net; Net.xml: the file contains the net with the entity ports and the links among the ports, that are seen as nodes; Entity.xml: the file contains every entity with its type, its name and its ports; Status.xml: the file contains every statusitem of each entity with its fuzzy values. The output file is only one file that contains all the entities and their statusitem with the short-term previsions. The file is named EntityStatuses.xml. This file is not shown due to its length by has the same structure of status.xml repeated for each step of prediction Association.xml <DOCUMENT> <ASSOC> <RESOURCE>DATA_TLC_LINES</RESOURCE> On-line Risk Prediction Tool SW Beta Release 14

15 <NET>1</NET> </ASSOC> <ASSOC> <RESOURCE>ALARM_TLC</RESOURCE> <NET>1</NET> </ASSOC> <ASSOC> <RESOURCE>CONNECTION</RESOURCE> <NET>1</NET> </ASSOC> <ASSOC> <RESOURCE>CURRENT</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>IMPEDANCE</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>ALARM_ELE</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>REPORT</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>BREAKER_STATE</RESOURCE> <NET>2</NET> </ASSOC> <ASSOC> <RESOURCE>LOAD_ALARM</RESOURCE> <NET>2</NET> </ASSOC> </DOCUMENT> Net.xml <DOCUMENT> <NET> <NAME>Rete_TLC</NAME> <TYPE>1</TYPE> <DIM>24</DIM> <NODES> <NODE>2</NODE> <NODE>3</NODE> <NODE>4</NODE> <NODE>5</NODE> On-line Risk Prediction Tool SW Beta Release 15

16 [ ] <NODE>1845</NODE> <NODE>1865</NODE> <NODE>1885</NODE> <NODE>1905</NODE> </NODES> <CONNECTIONS> <CONNECT> <FROM>2</FROM> <TO>22</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3008</FROM> <TO>904</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3009</FROM> <TO>924</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3010</FROM> <TO>944</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>3011</FROM> <TO>964</TO> <WEIGHT> <H>1</H> </WEIGHT> On-line Risk Prediction Tool SW Beta Release 16

17 <DELAY>0</DELAY> </CONNECT> [ ] <CONNECT> <FROM>803</FROM> <TO>1825</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>823</FROM> <TO>1845</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>843</FROM> <TO>1865</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>863</FROM> <TO>1885</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>883</FROM> <TO>1905</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> </CONNECTIONS> </NET> On-line Risk Prediction Tool SW Beta Release 17

18 <NET> <NAME>Rete_Ele</NAME> <TYPE>2</TYPE> <DIM>36</DIM> <NODES> <NODE>1282</NODE> <NODE>1283</NODE> <NODE>1284</NODE> <NODE>1285</NODE> [ ] <NODE>2904</NODE> <NODE>2922</NODE> <NODE>2923</NODE> <NODE>2924</NODE> </NODES> <CONNECTIONS> <CONNECT> <FROM>1296</FROM> <TO>1302</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>1297</FROM> <TO>1322</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>1323</FROM> <TO>1664</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>1664</FROM> <TO>1323</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> On-line Risk Prediction Tool SW Beta Release 18

19 [ ] <CONNECT> <FROM>2704</FROM> <TO>1292</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2724</FROM> <TO>1293</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2744</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2764</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2784</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2804</FROM> <TO>1285</TO> <WEIGHT> On-line Risk Prediction Tool SW Beta Release 19

20 <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2824</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2844</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2864</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2884</FROM> <TO>1285</TO> <WEIGHT> <H>1</H> </WEIGHT> <DELAY>0</DELAY> </CONNECT> <CONNECT> <FROM>2924</FROM> <TO>1287</TO> <WEIGHT> <H>1</H> </WEIGHT> On-line Risk Prediction Tool SW Beta Release 20

21 <DELAY>0</DELAY> </CONNECT> </CONNECTIONS> </NET> </DOCUMENT> Entity.xml <DOCUMENT> <TYPE>TlcHolNode</TYPE> <NAME>TlcHolNode1</NAME> <ID>1</ID> <PORT>1</PORT> <PORT>2</PORT> <PORT>3</PORT> <PORT>4</PORT> <PORT>5</PORT> <PORT>6</PORT> <PORT>7</PORT> <PORT>8</PORT> <PORT>9</PORT> <PORT>10</PORT> <PORT>11</PORT> <PORT>12</PORT> <PORT>13</PORT> <PORT>3002</PORT> <PORT>3003</PORT> <PORT>3004</PORT> <PORT>3005</PORT> <PORT>3006</PORT> <PORT>3007</PORT> <PORT>3008</PORT> <PORT>3009</PORT> <PORT>3010</PORT> <PORT>3011</PORT> <PORT>3012</PORT> <PORT>3013</PORT> <TYPE>RingRoutingService</TYPE> <NAME>RingRoutingService1</NAME> <ID>21</ID> <PORT>21</PORT> <PORT>22</PORT> <PORT>23</PORT> <TYPE>NMS</TYPE> <NAME>NMS1</NAME> <ID>41</ID> <PORT>41</PORT> On-line Risk Prediction Tool SW Beta Release 21

22 <PORT>42</PORT> <PORT>43</PORT> <PORT>44</PORT> <TYPE>TlcNode</TYPE> <NAME>TlcNode1</NAME> <ID>61</ID> <PORT>61</PORT> <PORT>62</PORT> <PORT>63</PORT> <TYPE>TlcNode</TYPE> <NAME>TlcNode2</NAME> <ID>81</ID> <PORT>81</PORT> <PORT>82</PORT> <PORT>83</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode1</NAME> <ID>101</ID> <PORT>101</PORT> <PORT>102</PORT> <PORT>103</PORT> <PORT>104</PORT> <PORT>105</PORT> <PORT>106</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode2</NAME> <ID>121</ID> <PORT>121</PORT> <PORT>122</PORT> <PORT>123</PORT> <PORT>124</PORT> <PORT>125</PORT> <PORT>126</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode3</NAME> <ID>141</ID> <PORT>141</PORT> <PORT>142</PORT> <PORT>143</PORT> <PORT>144</PORT> On-line Risk Prediction Tool SW Beta Release 22

23 <PORT>145</PORT> <PORT>146</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode4</NAME> <ID>161</ID> <PORT>161</PORT> <PORT>162</PORT> <PORT>163</PORT> <PORT>164</PORT> <PORT>165</PORT> <PORT>166</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode5</NAME> <ID>181</ID> <PORT>181</PORT> <PORT>182</PORT> <PORT>183</PORT> <PORT>184</PORT> <PORT>185</PORT> <PORT>186</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode6</NAME> <ID>201</ID> <PORT>201</PORT> <PORT>202</PORT> <PORT>203</PORT> <PORT>204</PORT> <PORT>205</PORT> <PORT>206</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode7</NAME> <ID>221</ID> <PORT>221</PORT> <PORT>222</PORT> <PORT>223</PORT> <PORT>224</PORT> <PORT>225</PORT> <PORT>226</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode8</NAME> <ID>241</ID> On-line Risk Prediction Tool SW Beta Release 23

24 <PORT>241</PORT> <PORT>242</PORT> <PORT>243</PORT> <PORT>244</PORT> <PORT>245</PORT> <PORT>246</PORT> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode9</NAME> <ID>261</ID> <PORT>261</PORT> <PORT>262</PORT> <PORT>263</PORT> <PORT>264</PORT> <PORT>265</PORT> <PORT>266</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc1</NAME> <ID>281</ID> <PORT>281</PORT> <PORT>282</PORT> <PORT>283</PORT> <PORT>284</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc2</NAME> <ID>301</ID> <PORT>301</PORT> <PORT>302</PORT> <PORT>303</PORT> <PORT>304</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc3</NAME> <ID>321</ID> <PORT>321</PORT> <PORT>322</PORT> <PORT>323</PORT> <PORT>324</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc4</NAME> <ID>341</ID> On-line Risk Prediction Tool SW Beta Release 24

25 <PORT>341</PORT> <PORT>342</PORT> <PORT>343</PORT> <PORT>344</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc5</NAME> <ID>361</ID> <PORT>361</PORT> <PORT>362</PORT> <PORT>363</PORT> <PORT>364</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc6</NAME> <ID>381</ID> <PORT>381</PORT> <PORT>382</PORT> <PORT>383</PORT> <PORT>384</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc7</NAME> <ID>401</ID> <PORT>401</PORT> <PORT>402</PORT> <PORT>403</PORT> <PORT>404</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc8</NAME> <ID>421</ID> <PORT>421</PORT> <PORT>422</PORT> <PORT>423</PORT> <PORT>424</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc9</NAME> <ID>441</ID> <PORT>441</PORT> <PORT>442</PORT> <PORT>443</PORT> <PORT>444</PORT> On-line Risk Prediction Tool SW Beta Release 25

26 <TYPE>WireTlc</TYPE> <NAME>WireTlc10</NAME> <ID>461</ID> <PORT>461</PORT> <PORT>462</PORT> <PORT>463</PORT> <PORT>464</PORT> <TYPE>Scada</TYPE> <NAME>Scada1</NAME> <ID>481</ID> <PORT>481</PORT> <PORT>482</PORT> <PORT>483</PORT> <TYPE>WireTlc</TYPE> <NAME>WireTlc11</NAME> <ID>501</ID> <PORT>501</PORT> <PORT>502</PORT> <PORT>503</PORT> <PORT>504</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode1</NAME> <ID>521</ID> <PORT>521</PORT> <PORT>522</PORT> <PORT>523</PORT> <PORT>524</PORT> <PORT>525</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode2</NAME> <ID>541</ID> <PORT>541</PORT> <PORT>542</PORT> <PORT>543</PORT> <PORT>544</PORT> <PORT>545</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode3</NAME> On-line Risk Prediction Tool SW Beta Release 26

27 <ID>561</ID> <PORT>561</PORT> <PORT>562</PORT> <PORT>563</PORT> <PORT>564</PORT> <PORT>565</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode4</NAME> <ID>581</ID> <PORT>581</PORT> <PORT>582</PORT> <PORT>583</PORT> <PORT>584</PORT> <PORT>585</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode5</NAME> <ID>601</ID> <PORT>601</PORT> <PORT>602</PORT> <PORT>603</PORT> <PORT>604</PORT> <PORT>605</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode6</NAME> <ID>621</ID> <PORT>621</PORT> <PORT>622</PORT> <PORT>623</PORT> <PORT>624</PORT> <PORT>625</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode7</NAME> <ID>641</ID> <PORT>641</PORT> <PORT>642</PORT> <PORT>643</PORT> <PORT>644</PORT> <PORT>645</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode8</NAME> On-line Risk Prediction Tool SW Beta Release 27

28 <ID>661</ID> <PORT>661</PORT> <PORT>662</PORT> <PORT>663</PORT> <PORT>664</PORT> <PORT>665</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode9</NAME> <ID>681</ID> <PORT>681</PORT> <PORT>682</PORT> <PORT>683</PORT> <PORT>684</PORT> <PORT>685</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode10</NAME> <ID>701</ID> <PORT>701</PORT> <PORT>702</PORT> <PORT>703</PORT> <PORT>704</PORT> <PORT>705</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode11</NAME> <ID>721</ID> <PORT>721</PORT> <PORT>722</PORT> <PORT>723</PORT> <PORT>724</PORT> <PORT>725</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode12</NAME> <ID>741</ID> <PORT>741</PORT> <PORT>742</PORT> <PORT>743</PORT> <PORT>744</PORT> <PORT>745</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode13</NAME> On-line Risk Prediction Tool SW Beta Release 28

29 <ID>761</ID> <PORT>761</PORT> <PORT>762</PORT> <PORT>763</PORT> <PORT>764</PORT> <PORT>765</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode14</NAME> <ID>781</ID> <PORT>781</PORT> <PORT>782</PORT> <PORT>783</PORT> <PORT>784</PORT> <PORT>785</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode15</NAME> <ID>801</ID> <PORT>801</PORT> <PORT>802</PORT> <PORT>803</PORT> <PORT>804</PORT> <PORT>805</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode16</NAME> <ID>821</ID> <PORT>821</PORT> <PORT>822</PORT> <PORT>823</PORT> <PORT>824</PORT> <PORT>825</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode17</NAME> <ID>841</ID> <PORT>841</PORT> <PORT>842</PORT> <PORT>843</PORT> <PORT>844</PORT> <PORT>845</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode18</NAME> On-line Risk Prediction Tool SW Beta Release 29

30 <ID>861</ID> <PORT>861</PORT> <PORT>862</PORT> <PORT>863</PORT> <PORT>864</PORT> <PORT>865</PORT> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode19</NAME> <ID>881</ID> <PORT>881</PORT> <PORT>882</PORT> <PORT>883</PORT> <PORT>884</PORT> <PORT>885</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService1</NAME> <ID>901</ID> <PORT>901</PORT> <PORT>902</PORT> <PORT>903</PORT> <PORT>904</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService2</NAME> <ID>921</ID> <PORT>921</PORT> <PORT>922</PORT> <PORT>923</PORT> <PORT>924</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService3</NAME> <ID>941</ID> <PORT>941</PORT> <PORT>942</PORT> <PORT>943</PORT> <PORT>944</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService4</NAME> <ID>961</ID> <PORT>961</PORT> On-line Risk Prediction Tool SW Beta Release 30

31 <PORT>962</PORT> <PORT>963</PORT> <PORT>964</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService5</NAME> <ID>981</ID> <PORT>981</PORT> <PORT>982</PORT> <PORT>983</PORT> <PORT>984</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService6</NAME> <ID>1001</ID> <PORT>1001</PORT> <PORT>1002</PORT> <PORT>1003</PORT> <PORT>1004</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService7</NAME> <ID>1021</ID> <PORT>1021</PORT> <PORT>1022</PORT> <PORT>1023</PORT> <PORT>1024</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService8</NAME> <ID>1041</ID> <PORT>1041</PORT> <PORT>1042</PORT> <PORT>1043</PORT> <PORT>1044</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService9</NAME> <ID>1061</ID> <PORT>1061</PORT> <PORT>1062</PORT> <PORT>1063</PORT> <PORT>1064</PORT> On-line Risk Prediction Tool SW Beta Release 31

32 <TYPE>ConnectionService</TYPE> <NAME>ConnectionService10</NAME> <ID>1081</ID> <PORT>1081</PORT> <PORT>1082</PORT> <PORT>1083</PORT> <PORT>1084</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService11</NAME> <ID>1101</ID> <PORT>1101</PORT> <PORT>1102</PORT> <PORT>1103</PORT> <PORT>1104</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService12</NAME> <ID>1121</ID> <PORT>1121</PORT> <PORT>1122</PORT> <PORT>1123</PORT> <PORT>1124</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService13</NAME> <ID>1141</ID> <PORT>1141</PORT> <PORT>1142</PORT> <PORT>1143</PORT> <PORT>1144</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService14</NAME> <ID>1161</ID> <PORT>1161</PORT> <PORT>1162</PORT> <PORT>1163</PORT> <PORT>1164</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService15</NAME> <ID>1181</ID> On-line Risk Prediction Tool SW Beta Release 32

33 <PORT>1181</PORT> <PORT>1182</PORT> <PORT>1183</PORT> <PORT>1184</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService16</NAME> <ID>1201</ID> <PORT>1201</PORT> <PORT>1202</PORT> <PORT>1203</PORT> <PORT>1204</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService17</NAME> <ID>1221</ID> <PORT>1221</PORT> <PORT>1222</PORT> <PORT>1223</PORT> <PORT>1224</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService18</NAME> <ID>1241</ID> <PORT>1241</PORT> <PORT>1242</PORT> <PORT>1243</PORT> <PORT>1244</PORT> <TYPE>ConnectionService</TYPE> <NAME>ConnectionService19</NAME> <ID>1261</ID> <PORT>1261</PORT> <PORT>1262</PORT> <PORT>1263</PORT> <PORT>1264</PORT> <TYPE>EleHolNode</TYPE> <NAME>EleHolNode1</NAME> <ID>1281</ID> <PORT>1281</PORT> <PORT>1282</PORT> <PORT>1283</PORT> <PORT>1284</PORT> <PORT>1285</PORT> On-line Risk Prediction Tool SW Beta Release 33

34 <PORT>1286</PORT> <PORT>1287</PORT> <PORT>1288</PORT> <PORT>1289</PORT> <PORT>1290</PORT> <PORT>1291</PORT> <PORT>1292</PORT> <PORT>1293</PORT> <PORT>1294</PORT> <PORT>1295</PORT> <PORT>1296</PORT> <PORT>1297</PORT> <TYPE>ReportService</TYPE> <NAME>ReportService1</NAME> <ID>1301</ID> <PORT>1301</PORT> <PORT>1302</PORT> <TYPE>FisrService</TYPE> <NAME>FisrService1</NAME> <ID>1321</ID> <PORT>1321</PORT> <PORT>1322</PORT> <PORT>1323</PORT> <PORT>1324</PORT> <PORT>1325</PORT> <PORT>1326</PORT> <PORT>1327</PORT> <PORT>1328</PORT> <PORT>1329</PORT> <PORT>1330</PORT> <PORT>1331</PORT> <PORT>1332</PORT> <PORT>1333</PORT> <PORT>1334</PORT> <PORT>1335</PORT> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation1</NAME> <ID>1341</ID> <PORT>1341</PORT> <PORT>1342</PORT> <PORT>1343</PORT> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation2</NAME> <ID>1361</ID> On-line Risk Prediction Tool SW Beta Release 34

35 <PORT>1361</PORT> <PORT>1362</PORT> <PORT>1363</PORT> <TYPE>Joint</TYPE> <NAME>Joint1</NAME> <ID>1381</ID> <PORT>1381</PORT> <PORT>1382</PORT> <PORT>1383</PORT> <PORT>1384</PORT> <PORT>1385</PORT> <TYPE>Joint</TYPE> <NAME>Joint2</NAME> <ID>1401</ID> <PORT>1401</PORT> <PORT>1402</PORT> <PORT>1403</PORT> <PORT>1404</PORT> <PORT>1405</PORT> <TYPE>Joint</TYPE> <NAME>Joint3</NAME> <ID>1421</ID> <PORT>1421</PORT> <PORT>1422</PORT> <PORT>1423</PORT> <PORT>1424</PORT> <PORT>1425</PORT> <TYPE>Joint</TYPE> <NAME>Joint4</NAME> <ID>1441</ID> <PORT>1441</PORT> <PORT>1442</PORT> <PORT>1443</PORT> <PORT>1444</PORT> <PORT>1445</PORT> <TYPE>Joint</TYPE> <NAME>Joint5</NAME> <ID>1461</ID> <PORT>1461</PORT> <PORT>1462</PORT> On-line Risk Prediction Tool SW Beta Release 35

36 <PORT>1463</PORT> <PORT>1464</PORT> <PORT>1465</PORT> <TYPE>Joint</TYPE> <NAME>Joint6</NAME> <ID>1481</ID> <PORT>1481</PORT> <PORT>1482</PORT> <PORT>1483</PORT> <PORT>1484</PORT> <PORT>1485</PORT> <TYPE>Joint</TYPE> <NAME>Joint7</NAME> <ID>1501</ID> <PORT>1501</PORT> <PORT>1502</PORT> <PORT>1503</PORT> <PORT>1504</PORT> <PORT>1505</PORT> <TYPE>Joint</TYPE> <NAME>Joint8</NAME> <ID>1521</ID> <PORT>1521</PORT> <PORT>1522</PORT> <PORT>1523</PORT> <PORT>1524</PORT> <PORT>1525</PORT> <TYPE>Joint</TYPE> <NAME>Joint9</NAME> <ID>1541</ID> <PORT>1541</PORT> <PORT>1542</PORT> <PORT>1543</PORT> <PORT>1544</PORT> <PORT>1545</PORT> <TYPE>Joint</TYPE> <NAME>Joint10</NAME> <ID>1561</ID> <PORT>1561</PORT> <PORT>1562</PORT> On-line Risk Prediction Tool SW Beta Release 36

37 <PORT>1563</PORT> <PORT>1564</PORT> <PORT>1565</PORT> <TYPE>Joint</TYPE> <NAME>Joint11</NAME> <ID>1581</ID> <PORT>1581</PORT> <PORT>1582</PORT> <PORT>1583</PORT> <PORT>1584</PORT> <PORT>1585</PORT> <TYPE>Joint</TYPE> <NAME>Joint12</NAME> <ID>1601</ID> <PORT>1601</PORT> <PORT>1602</PORT> <PORT>1603</PORT> <PORT>1604</PORT> <PORT>1605</PORT> <TYPE>Joint</TYPE> <NAME>Joint13</NAME> <ID>1621</ID> <PORT>1621</PORT> <PORT>1622</PORT> <PORT>1623</PORT> <PORT>1624</PORT> <PORT>1625</PORT> <TYPE>Joint</TYPE> <NAME>Joint14</NAME> <ID>1641</ID> <PORT>1641</PORT> <PORT>1642</PORT> <PORT>1643</PORT> <PORT>1644</PORT> <PORT>1645</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker1</NAME> <ID>1661</ID> <PORT>1661</PORT> <PORT>1662</PORT> On-line Risk Prediction Tool SW Beta Release 37

38 <PORT>1663</PORT> <PORT>1664</PORT> <PORT>1665</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker2</NAME> <ID>1681</ID> <PORT>1681</PORT> <PORT>1682</PORT> <PORT>1683</PORT> <PORT>1684</PORT> <PORT>1685</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker3</NAME> <ID>1701</ID> <PORT>1701</PORT> <PORT>1702</PORT> <PORT>1703</PORT> <PORT>1704</PORT> <PORT>1705</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker4</NAME> <ID>1721</ID> <PORT>1721</PORT> <PORT>1722</PORT> <PORT>1723</PORT> <PORT>1724</PORT> <PORT>1725</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker5</NAME> <ID>1741</ID> <PORT>1741</PORT> <PORT>1742</PORT> <PORT>1743</PORT> <PORT>1744</PORT> <PORT>1745</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker6</NAME> <ID>1761</ID> <PORT>1761</PORT> <PORT>1762</PORT> On-line Risk Prediction Tool SW Beta Release 38

39 <PORT>1763</PORT> <PORT>1764</PORT> <PORT>1765</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker7</NAME> <ID>1781</ID> <PORT>1781</PORT> <PORT>1782</PORT> <PORT>1783</PORT> <PORT>1784</PORT> <PORT>1785</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker8</NAME> <ID>1801</ID> <PORT>1801</PORT> <PORT>1802</PORT> <PORT>1803</PORT> <PORT>1804</PORT> <PORT>1805</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker9</NAME> <ID>1821</ID> <PORT>1821</PORT> <PORT>1822</PORT> <PORT>1823</PORT> <PORT>1824</PORT> <PORT>1825</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker10</NAME> <ID>1841</ID> <PORT>1841</PORT> <PORT>1842</PORT> <PORT>1843</PORT> <PORT>1844</PORT> <PORT>1845</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker11</NAME> <ID>1861</ID> <PORT>1861</PORT> <PORT>1862</PORT> On-line Risk Prediction Tool SW Beta Release 39

40 <PORT>1863</PORT> <PORT>1864</PORT> <PORT>1865</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker12</NAME> <ID>1881</ID> <PORT>1881</PORT> <PORT>1882</PORT> <PORT>1883</PORT> <PORT>1884</PORT> <PORT>1885</PORT> <TYPE>Breaker</TYPE> <NAME>Breaker13</NAME> <ID>1901</ID> <PORT>1901</PORT> <PORT>1902</PORT> <PORT>1903</PORT> <PORT>1904</PORT> <PORT>1905</PORT> <TYPE>Load</TYPE> <NAME>Load1</NAME> <ID>1921</ID> <PORT>1921</PORT> <PORT>1922</PORT> <PORT>1923</PORT> <TYPE>Load</TYPE> <NAME>Load2</NAME> <ID>1941</ID> <PORT>1941</PORT> <PORT>1942</PORT> <PORT>1943</PORT> <TYPE>Load</TYPE> <NAME>Load3</NAME> <ID>1961</ID> <PORT>1961</PORT> <PORT>1962</PORT> <PORT>1963</PORT> On-line Risk Prediction Tool SW Beta Release 40

41 <TYPE>Load</TYPE> <NAME>Load4</NAME> <ID>1981</ID> <PORT>1981</PORT> <PORT>1982</PORT> <PORT>1983</PORT> <TYPE>Load</TYPE> <NAME>Load5</NAME> <ID>2001</ID> <PORT>2001</PORT> <PORT>2002</PORT> <PORT>2003</PORT> <TYPE>Load</TYPE> <NAME>Load6</NAME> <ID>2021</ID> <PORT>2021</PORT> <PORT>2022</PORT> <PORT>2023</PORT> <TYPE>Load</TYPE> <NAME>Load7</NAME> <ID>2041</ID> <PORT>2041</PORT> <PORT>2042</PORT> <PORT>2043</PORT> <TYPE>Load</TYPE> <NAME>Load8</NAME> <ID>2061</ID> <PORT>2061</PORT> <PORT>2062</PORT> <PORT>2063</PORT> <TYPE>Load</TYPE> <NAME>Load9</NAME> <ID>2081</ID> <PORT>2081</PORT> <PORT>2082</PORT> <PORT>2083</PORT> On-line Risk Prediction Tool SW Beta Release 41

42 <TYPE>Load</TYPE> <NAME>Load10</NAME> <ID>2101</ID> <PORT>2101</PORT> <PORT>2102</PORT> <PORT>2103</PORT> <TYPE>Load</TYPE> <NAME>Load11</NAME> <ID>2121</ID> <PORT>2121</PORT> <PORT>2122</PORT> <PORT>2123</PORT> <TYPE>Load</TYPE> <NAME>Load12</NAME> <ID>2141</ID> <PORT>2141</PORT> <PORT>2142</PORT> <PORT>2143</PORT> <TYPE>Load</TYPE> <NAME>Load13</NAME> <ID>2161</ID> <PORT>2161</PORT> <PORT>2162</PORT> <PORT>2163</PORT> <TYPE>Load</TYPE> <NAME>Load14</NAME> <ID>2181</ID> <PORT>2181</PORT> <PORT>2182</PORT> <PORT>2183</PORT> <TYPE>Wire</TYPE> <NAME>Wire1</NAME> <ID>2201</ID> <PORT>2201</PORT> <PORT>2202</PORT> <PORT>2203</PORT> <PORT>2204</PORT> On-line Risk Prediction Tool SW Beta Release 42

43 <TYPE>Wire</TYPE> <NAME>Wire2</NAME> <ID>2221</ID> <PORT>2221</PORT> <PORT>2222</PORT> <PORT>2223</PORT> <PORT>2224</PORT> <TYPE>Wire</TYPE> <NAME>Wire3</NAME> <ID>2241</ID> <PORT>2241</PORT> <PORT>2242</PORT> <PORT>2243</PORT> <PORT>2244</PORT> <TYPE>Wire</TYPE> <NAME>Wire4</NAME> <ID>2261</ID> <PORT>2261</PORT> <PORT>2262</PORT> <PORT>2263</PORT> <PORT>2264</PORT> <TYPE>Wire</TYPE> <NAME>Wire5</NAME> <ID>2281</ID> <PORT>2281</PORT> <PORT>2282</PORT> <PORT>2283</PORT> <PORT>2284</PORT> [ ] <TYPE>Wire</TYPE> <NAME>Wire35</NAME> <ID>2881</ID> <PORT>2881</PORT> <PORT>2882</PORT> <PORT>2883</PORT> <PORT>2884</PORT> <TYPE>Wire</TYPE> <NAME>Wire36</NAME> <ID>2901</ID> On-line Risk Prediction Tool SW Beta Release 43

44 <PORT>2901</PORT> <PORT>2902</PORT> <PORT>2903</PORT> <PORT>2904</PORT> <TYPE>Wire</TYPE> <NAME>Wire37</NAME> <ID>2921</ID> <PORT>2921</PORT> <PORT>2922</PORT> <PORT>2923</PORT> <PORT>2924</PORT> </DOCUMENT> Status.xml <DOCUMENT> <TYPE>TlcHolNode</TYPE> <NAME>TlcHolNode1</NAME> <NAME>fault_ring_wire</NAME> <NAME>tlc_oper</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 44

45 <L> </L> <M> </M> <R> </R> <TYPE>RingRoutingService</TYPE> <NAME>RingRoutingService1</NAME> <NAME>fault_ring_wire</NAME> <TYPE>NMS</TYPE> <NAME>NMS1</NAME> <NAME>fault_ring_wire</NAME> <TYPE>TlcNode</TYPE> <NAME>TlcNode1</NAME> On-line Risk Prediction Tool SW Beta Release 45

46 <TYPE>TlcNode</TYPE> <NAME>TlcNode2</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode1</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> On-line Risk Prediction Tool SW Beta Release 46

47 <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode2</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 47

48 <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode3</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 48

49 <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode4</NAME> <NAME>update</NAME> <NAME>n2s</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode5</NAME> On-line Risk Prediction Tool SW Beta Release 49

50 <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode6</NAME> <NAME>n2s</NAME> On-line Risk Prediction Tool SW Beta Release 50

51 <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode7</NAME> <NAME>update</NAME> <NAME>n2s</NAME> On-line Risk Prediction Tool SW Beta Release 51

52 <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode8</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> On-line Risk Prediction Tool SW Beta Release 52

53 <NAME>mechanical_fault</NAME> <TYPE>TlcRingNode</TYPE> <NAME>TlcRingNode9</NAME> <NAME>n2s</NAME> <NAME>update</NAME> <NAME>fault_ring_wire</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 53

54 <TYPE>WireTlc</TYPE> <NAME>WireTlc1</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc2</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc3</NAME> On-line Risk Prediction Tool SW Beta Release 54

55 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc4</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc5</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 55

56 <TYPE>WireTlc</TYPE> <NAME>WireTlc6</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc7</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc8</NAME> On-line Risk Prediction Tool SW Beta Release 56

57 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc9</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>WireTlc</TYPE> <NAME>WireTlc10</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 57

58 <TYPE>WireTlc</TYPE> <NAME>WireTlc11</NAME> <NAME>mechanical_fault</NAME> <TYPE>Scada</TYPE> <NAME>Scada1</NAME> <NAME>conn_to_rtu</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 58

59 <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode1</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode2</NAME> On-line Risk Prediction Tool SW Beta Release 59

60 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode3</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 60

61 <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode4</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 61

62 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode5</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> On-line Risk Prediction Tool SW Beta Release 62

63 <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode6</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> On-line Risk Prediction Tool SW Beta Release 63

64 <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode7</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 64

65 <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode8</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode9</NAME> On-line Risk Prediction Tool SW Beta Release 65

66 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode10</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 66

67 <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode11</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 67

68 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode12</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> On-line Risk Prediction Tool SW Beta Release 68

69 <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode13</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> On-line Risk Prediction Tool SW Beta Release 69

70 <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode14</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode15</NAME> On-line Risk Prediction Tool SW Beta Release 70

71 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode16</NAME> On-line Risk Prediction Tool SW Beta Release 71

72 <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode17</NAME> <NAME>data_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 72

73 <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode18</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 73

74 <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>TlcScadaNode</TYPE> <NAME>TlcScadaNode19</NAME> <NAME>data_to_rtu</NAME> <NAME>conn_to_rtu</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 74

75 <NAME>reconfigTLC</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService1</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 75

76 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService2</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService3</NAME> On-line Risk Prediction Tool SW Beta Release 76

77 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService4</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 77

78 <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService5</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> On-line Risk Prediction Tool SW Beta Release 78

79 <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService6</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> On-line Risk Prediction Tool SW Beta Release 79

80 <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService7</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 80

81 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService8</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 81

82 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService9</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService10</NAME> On-line Risk Prediction Tool SW Beta Release 82

83 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService11</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 83

84 <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService12</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> On-line Risk Prediction Tool SW Beta Release 84

85 <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService13</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> On-line Risk Prediction Tool SW Beta Release 85

86 <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService14</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> On-line Risk Prediction Tool SW Beta Release 86

87 <TYPE>Connectionservice</TYPE> <NAME>ConnectionService15</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService16</NAME> On-line Risk Prediction Tool SW Beta Release 87

88 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService17</NAME> On-line Risk Prediction Tool SW Beta Release 88

89 <NAME>conn_to_rtu</NAME> <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService18</NAME> <NAME>conn_to_rtu</NAME> On-line Risk Prediction Tool SW Beta Release 89

90 <NAME>active</NAME> <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>Connectionservice</TYPE> <NAME>ConnectionService19</NAME> <NAME>conn_to_rtu</NAME> <NAME>active</NAME> On-line Risk Prediction Tool SW Beta Release 90

91 <NAME>update</NAME> <NAME>fault_scada_node</NAME> <TYPE>EleHolNode</TYPE> <NAME>EleHolNode1</NAME> <NAME>reporting</NAME> <NAME>ele_fault</NAME> <TYPE>ReportService</TYPE> <NAME>ReportService1</NAME> On-line Risk Prediction Tool SW Beta Release 91

92 <NAME>reporting</NAME> <TYPE>FisrService</TYPE> <NAME>FisrService1</NAME> <NAME>reconfig</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>reconfig_start</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation1</NAME> On-line Risk Prediction Tool SW Beta Release 92

93 <NAME>Telecontrolled</NAME> <NAME>NominalSecondaryVoltage</NAME> <L>22000</L> <M>22000</M> <R>22000</R> <NAME>CurrentThreshold</NAME> <L> </L> <M> </M> <R> </R> <NAME>breaker_fault</NAME> <TYPE>IECSecondaryStation</TYPE> <NAME>IECSecondaryStation2</NAME> <NAME>Telecontrolled</NAME> On-line Risk Prediction Tool SW Beta Release 93

94 <NAME>NominalSecondaryVoltage</NAME> <L>22000</L> <M>22000</M> <R>22000</R> <NAME>CurrentThreshold</NAME> <L> </L> <M> </M> <R> </R> <NAME>breaker_fault</NAME> <TYPE>Joint</TYPE> <NAME>Joint1</NAME> <TYPE>Joint</TYPE> <NAME>Joint2</NAME> On-line Risk Prediction Tool SW Beta Release 94

95 <TYPE>Joint</TYPE> <NAME>Joint3</NAME> <TYPE>Joint</TYPE> <NAME>Joint4</NAME> <TYPE>Joint</TYPE> <NAME>Joint5</NAME> <TYPE>Joint</TYPE> <NAME>Joint6</NAME> On-line Risk Prediction Tool SW Beta Release 95

96 <TYPE>Joint</TYPE> <NAME>Joint7</NAME> <TYPE>Joint</TYPE> <NAME>Joint8</NAME> <TYPE>Joint</TYPE> <NAME>Joint9</NAME> <TYPE>Joint</TYPE> <NAME>Joint10</NAME> On-line Risk Prediction Tool SW Beta Release 96

97 <TYPE>Joint</TYPE> <NAME>Joint11</NAME> <TYPE>Joint</TYPE> <NAME>Joint12</NAME> <TYPE>Joint</TYPE> <NAME>Joint13</NAME> <TYPE>Joint</TYPE> <NAME>Joint14</NAME> On-line Risk Prediction Tool SW Beta Release 97

98 <TYPE>Breaker</TYPE> <NAME>Breaker1</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker2</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> On-line Risk Prediction Tool SW Beta Release 98

99 <TYPE>Breaker</TYPE> <NAME>Breaker3</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker4</NAME> <NAME>internal_impedance</NAME> On-line Risk Prediction Tool SW Beta Release 99

100 <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Breaker</TYPE> <NAME>Breaker5</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker6</NAME> On-line Risk Prediction Tool SW Beta Release 100

101 <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker7</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Breaker</TYPE> <NAME>Breaker8</NAME> On-line Risk Prediction Tool SW Beta Release 101

102 <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker9</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> On-line Risk Prediction Tool SW Beta Release 102

103 <TYPE>Breaker</TYPE> <NAME>Breaker10</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <L>0</L> <M>0</M> <R>0</R> <TYPE>Breaker</TYPE> <NAME>Breaker11</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> On-line Risk Prediction Tool SW Beta Release 103

104 <TYPE>Breaker</TYPE> <NAME>Breaker12</NAME> <NAME>internal_impedance</NAME> <NAME>breaker_state</NAME> <TYPE>Breaker</TYPE> <NAME>Breaker13</NAME> <NAME>internal_impedance</NAME> On-line Risk Prediction Tool SW Beta Release 104

105 <NAME>breaker_state</NAME> <TYPE>Load</TYPE> <NAME>Load1</NAME> <NAME>mechanical_fault</NAME> <L>0</L> <M>0</M> <R>0</R> <NAME>internal_impedance</NAME> <L> </L> <M> </M> <R> </R> <NAME>voltage</NAME> <L> </L> <M> </M> <R> </R> <TYPE>Load</TYPE> <NAME>Load2</NAME> On-line Risk Prediction Tool SW Beta Release 105

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro psimoes@dei.uc.pt

More information

PROJECT FINAL REPORT

PROJECT FINAL REPORT PROJECT FINAL REPORT Grant Agreement number: 225353 Project acronym: MICIE Project title: Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

This Working Paper provides an introduction to the web services security standards.

This Working Paper provides an introduction to the web services security standards. International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

COTS SECURITY GUIDANCE (CSG) VOICE OVER INTERNET PROTOCOL (VoIP)

COTS SECURITY GUIDANCE (CSG) VOICE OVER INTERNET PROTOCOL (VoIP) COTS SECURITY GUIDANCE (CSG) VOICE OVER INTERNET PROTOCOL (VoIP) CSG-04\G August This page intentionally left blank. Foreword The Voiceover Internet Protocol (CSG-04\G) is an unclassified publication,

More information

QAME Support for Policy-Based Management of Country-wide Networks

QAME Support for Policy-Based Management of Country-wide Networks QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it

Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Integrated On-Line Risk Prediction: Think Globally and Act Locally Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it Final Workshop Rome, December 16th, 2014 Motivation and Background Power Grid Operating

More information

Chapter 32 Internet Security

Chapter 32 Internet Security Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

Protocol Security Where?

Protocol Security Where? IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos

More information

Comparison of Routable Control System Security Approaches

Comparison of Routable Control System Security Approaches PNNL-20531 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Comparison of Routable Control System Security Approaches TW Edgar MD Hadley TE Carroll DO Manz JD Winn June 2011

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where

More information

VPN. VPN For BIPAC 741/743GE

VPN. VPN For BIPAC 741/743GE VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,

More information

Lecture 17 - Network Security

Lecture 17 - Network Security Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Ontological Identification of Patterns for Choreographing Business Workflow

Ontological Identification of Patterns for Choreographing Business Workflow University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Annual review FLORENCE 2013. WP4 Network: prototypes

Annual review FLORENCE 2013. WP4 Network: prototypes Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

University of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es. University of Murcia SPAIN

University of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es. University of Murcia SPAIN University of Murcia (Spain) Antonio F. Gómez Skarmeta skarmeta@dif.um.es University of Murcia SPAIN Network Security in IPv6 IPv6 IPsec/IKE Implementations UMU-PKIv6 Policy-Based Network Management (PBNM)

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

WISE-4000 Series. WISE IoT Wireless I/O Modules

WISE-4000 Series. WISE IoT Wireless I/O Modules WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Security Services on IPv6 Networks: PKIv6 and IPv6-VPNs

Security Services on IPv6 Networks: PKIv6 and IPv6-VPNs Security Services on IPv6 Networks: PKIv6 and IPv6-VPNs Antonio F. Gómez Skarmeta University of Murcia SPAIN 1Year Subactivity Description Mobility on IPv6 networks Going to be coordinated

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Release: 1. ICANWK502A Implement secure encryption technologies

Release: 1. ICANWK502A Implement secure encryption technologies Release: 1 ICANWK502A Implement secure encryption technologies ICANWK502A Implement secure encryption technologies Modification History Release Release 1 Comments This Unit first released with ICA11 Information

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

How To Protect Critical Infrastructure From Attack

How To Protect Critical Infrastructure From Attack Trust and Reputation Management for Critical Infrastructure Protection Filipe Caldeira 12, Edmundo Monteiro 1, and Paulo Simões 1 1 Universidade de Coimbra - DEI/CISUC, Coimbra, 3030-290, Portugal {fmanuel,edmundo,psimoes}@dei.uc.pt

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security

More information

Lecture 10: Communications Security

Lecture 10: Communications Security INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Secure Use of the New NHS Network (N3): Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version

More information

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers Q&A VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers OVERVIEW Q. What is a VPN? A. A VPN, or virtual private network, delivers the benefits of private network security,

More information

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

The BANDIT Products in Virtual Private Networks

The BANDIT Products in Virtual Private Networks encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their

More information

Gigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011

Gigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011 Gigaset IP and IP-PRO Phones Provisioning / Remote Management last modifications by J. Stahl, Bocholt, January the 18 th 2011 Agenda Provisioning / Remote Management for Gigaset IP phones Introduction

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Products that are referred to in this document may be trademarks and/or registered trademarks of the respective owners.

Products that are referred to in this document may be trademarks and/or registered trademarks of the respective owners. 2015 GEOVAP, spol. s r. o. All rights reserved. GEOVAP, spol. s r. o. Cechovo nabrezi 1790 530 03 Pardubice Czech Republic +420 466 024 618 http://www.geovap.cz Products that are referred to in this document

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

CS 4803 Computer and Network Security

CS 4803 Computer and Network Security Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240 PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions

EDA 1200 4.3 Training Programs. Catalog of Course Descriptions EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND

More information

<Insert Picture Here> Oracle Web Services Manager (WSM)

<Insert Picture Here> Oracle Web Services Manager (WSM) Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

Huawei Remote Access Security Solution for Enterprise Networks. -Secure and Stable Platforms for Network Interconnection and Data Interaction

Huawei Remote Access Security Solution for Enterprise Networks. -Secure and Stable Platforms for Network Interconnection and Data Interaction Huawei Remote Access Security Solution for Enterprise Networks -Secure and Stable Platforms for Network Interconnection and Data Interaction HUAWEI TECHNOLOGIES CO., LTD. Huawei Remote Access Security

More information

Building Robust Security Solutions Using Layering And Independence

Building Robust Security Solutions Using Layering And Independence Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Johnnie Chen Project Manager of Network Security Group Network Benchmarking Lab Network Benchmarking Laboratory

More information

Information Technology Security Guideline. Network Security Zoning

Information Technology Security Guideline. Network Security Zoning Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

BeamYourScreen Security

BeamYourScreen Security BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...

More information

Quality Model for Web Services

Quality Model for Web Services Quality Model for Web Services September 2005 Document identifier: WSQM -2.0 Location: Editor: Eunju Kim (NCA), Youngkon Lee (KOREA Polytechnic University) Abstract: The purpose of this document is to

More information

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents

More information

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later)

More information