ABB RELION 670 SERIES Manual page 110

Cyber security deployment guideline
Hide thumbs Also See for RELION 670 SERIES:
Table of Contents

Advertisement

Section 9
Glossary
104
SCADA
Supervision, control and data acquisition, see also
MicroSCADA
SCT
System configuration tool according to standard IEC 61850
SHA
The Secure Hash Algorithm is a family of cryptographic hash
functions. The SHA 2 family comprise two similar hash
functions, with different block sizes, known as SHA-256 and
SHA-512.
SMT
Signal matrix tool within PCM600
SNTP
Simple network time protocol – is used to synchronize
computer clocks on local area networks. This reduces the
requirement to have accurate hardware clocks in every
embedded system in a network. Each embedded node can
instead synchronize with a remote clock, providing the
required accuracy.
SPA
Strömberg protection acquisition, a serial master/slave
protocol for point-to-point communication
TLS
Transport Layer Security (TLS) is a cryptographic protocol
that provides communication security over the Internet. TLS
encrypt the segments of network connections at the
Application Layer for the Transport Layer, using asymmetric
cryptography for key exchange, symmetric encryption for
confidentiality, and message authentication codes for message
integrity.
Syslog
Syslog is a standard for computer data logging. Syslog can be
used for computer system management and security auditing
as well as generalized informational, analysis, and debugging
messages
TCP
Transmission control protocol. The most common transport
layer protocol used on Ethernet and the Internet.
TCP/IP
Transmission control protocol over Internet Protocol. The de
facto standard Ethernet protocols incorporated into 4.2BSD
Unix. TCP/IP was developed by DARPA for Internet working
and encompasses both network layer and transport layer
protocols. While TCP and IP specify two protocols at specific
protocol layers, TCP/IP is often used to refer to the entire US
Department of Defense protocol suite based upon these,
including Telnet, FTP, UDP and RDP.
UDP
The User Datagram Protocol (UDP) is one of the core
members of the Internet protocol suite. With UDP, computer
applications can send messages, in this case referred to as
datagrams, to other hosts on an Internet Protocol (IP) network
without prior communications to set up special transmission
channels or data paths.
UMT
User management tool
1MRK 511 399-UEN B
670 series 2.2 IEC
Cyber security deployment guideline

Advertisement

Table of Contents
loading

This manual is also suitable for:

Relion 670 series

Table of Contents