Cyber Security

A Chap­ter of the

IEC 62351 is a stan­dard devel­oped to han­dle the secu­ri­ty of TC 57 series of pro­to­cols includ­ing IEC 60870–5 series, IEC 60870–6 series, IEC 61850 series, IEC 61970 series & IEC 61968 series.

The dif­fer­ent secu­ri­ty objec­tives include the authen­ti­ca­tion of data trans­fer through dig­i­tal sig­na­tures, pre­ven­tion of eaves­drop­ping and play­back as well as spoof­ing, and intru­sion detection.

IPsec (IP for “Inter­net Pro­to­col” and sec for “secure”) is a group of pro­to­cols to ensure the integri­ty, con­fi­den­tial­i­ty and authen­ti­ca­tion of data com­mu­ni­ca­tions over an IP network.

IPsec is com­mon­ly used as a base for VPNs (Vir­tu­al Pri­vate Net­works), encrypt­ing the IP pack­ets and authen­ti­cat­ing the source where the pack­ets come from.

Ter­mi­nal Access Con­troller Access-Con­trol Sys­tem Plus (TACACS+) is a pro­to­col devel­oped by Cis­co to han­dle authen­ti­ca­tion, autho­riza­tion, and account­ing (AAA) ser­vices and was released as an open stan­dard begin­ning in 1993.

It is an exten­sion of its pre­de­ces­sor TACACS, encrypt­ing the full con­tent of each pack­et and pro­vides gran­u­lar con­trol (com­mand by com­mand autho­riza­tion) whilst oper­at­ing over TCP.

Open­VPN is a vir­tu­al pri­vate net­work (VPN) pro­to­col and soft­ware for both client and serv­er applications.

It imple­ments tech­niques to cre­ate secure point-to-point or site-to-site con­nec­tions in rout­ed or bridged con­fig­u­ra­tions and remote access facil­i­ties enabling peer authen­ti­ca­tion using pre-shared secret keys, cer­tifi­cates or usernames/passwords.

Pub­lic key infra­struc­ture (PKI) refers to a range of tech­nolo­gies for authen­ti­cat­ing users and devices in order to secure the dig­i­tal trans­fer of infor­ma­tion for a range of net­work activ­i­ties such as e‑commerce, inter­net bank­ing and con­fi­den­tial email.

It includes a set of roles, poli­cies, hard­ware, soft­ware and pro­ce­dures need­ed to cre­ate, man­age, dis­trib­ute, use, store and revoke dig­i­tal cer­tifi­cates and man­age pub­lic-key encryption.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

iGrid Solutions and Applications

Automation with IEC 61850 

The IEC 61850 stan­dard is enabling new opor­tu­ni­ties for ven­dor inter­op­er­abil­i­ty and advanced sub­sta­tion automa­tion. Find out how you can take advan­tage of IEC 61850 with easy-to-use and adapt­able solu­tions for a sim­ple migra­tion or retrofit.

HV Substation Automation

Pow­er­ful sub­sta­tion automa­tion sys­tems often han­dle numer­ous com­mu­ni­ca­tion pro­to­cols and media with­in one net­work, which can result in expen­sive and com­plex projects.  Avoid these prob­lems with inter­op­er­a­ble tech­nol­o­gy and smart con­fig­u­ra­tion tools.

MV Distribution Grid Automation

It is often dif­fi­cult to find the exact solu­tion you need in a MV appli­ca­tion, lead­ing to high­er costs than nec­es­sary. With our scal­able and adapt­able solu­tions you will be able to only pay for what you real­ly need, with­out com­prim­is­ing on qual­i­ty or security.

Photovoltaic Power Station

Using an open and scal­able SCADA sys­tem to mon­i­tor and con­trol a PV plant comes with many ben­e­fits on sev­er­al lev­els. Find out how advanced com­mu­ni­ca­tion tech­nol­o­gy affects PV oper­a­tion, main­te­nance, sys­tem design, invest­ment secu­ri­ty, profits…