{"id":254764,"date":"2024-10-19T16:50:09","date_gmt":"2024-10-19T16:50:09","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-dd-iec-ts-62351-72010\/"},"modified":"2024-10-25T12:16:06","modified_gmt":"2024-10-25T12:16:06","slug":"bsi-dd-iec-ts-62351-72010","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-dd-iec-ts-62351-72010\/","title":{"rendered":"BSI DD IEC\/TS 62351-7:2010"},"content":{"rendered":"
Power systems operations are increasingly reliant on information infrastructures, including communication networks, intelligent electronic devices (IEDs), and self-defining communication protocols. Therefore, management of the information infrastructure has become crucial to providing the necessary high levels of security and reliability in power system operations. Using the concepts developed in the IETF simple network management protocol (SNMP) standards for network management, IEC\/TS 62351-7 defines network and system management (NSM) data object models that are specific to power system operations. These NSM data objects will be used to monitor the health of networks and systems, to detect possible security intrusions, and to manage the performance and reliability of the information infrastructure.<\/p>\n
The NSM data objects use the naming conventions developed for IEC 61850, expanded to address NSM issues. These data objects, and the data types of which they are comprised, are defined as abstract models of data objects. The actual bits-and-bytes formats of the data objects will depend upon the mapping of these abstract NSM data objects to specific protocols, such as IEC 61850, IEC 60870-5, IEC 60870-6, IEC 61968\/IEC 61970 (CIM), web services, SNMP or any other appropriate protocol. Those mappings will need to be standardized in separate documents.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Glossary of terms and definitions 5 Background of network and system management (NSM) requirements (informative) 5.1 Objectives of IEC NSM standards <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Figures Figure 1 \u2013 Comparison of NSM data objects with IEC\u00a061850 objects Figure 2 \u2013 Management of both the power system infrastructure and the information infrastructure <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Current lack of coherent information infrastructure <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3 Intrusion detection systems (IDS) Figure 3 \u2013 Power system operations systems, illustrating the security monitoring architecture <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Figure 4 \u2013 Information exchange between applications: generic communication topology <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.4 Network and system management (NSM) concepts Figure 5 \u2013 Active security monitoring architecture with NSM data objects <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6 Security and reliability NSM requirements for power system operations (informative) 6.1 NSM requirements: Monitoring and controlling the networks and protocols <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.2 NSM requirements: Monitoring and management of end systems <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.3 NSM requirements: Intrusion detection functions <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7 NSM abstract data types 7.1 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.2 NSM data object constructs <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.3 High level NSM data type structures Figure 6 \u2013 Alarm structure <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Figure 7 \u2013 Status structure Figure 8 \u2013 Measurement structure <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Figure 9 \u2013 Setting structure Figure 10 \u2013 Array <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Figure 11 \u2013 Table Figure 12 \u2013 Control hardware <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8 NSM abstract data objects 8.1 Communications health NSM data objects Figure 13 \u2013 Control software <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.2 End system health NSM data objects <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 8.3 Intrusion detection NSM data objects <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communication security – Network and system management (NSM) data object models<\/b><\/p>\n |