CYBER SECURITY
■Cyber security is a domain that addresses attacks on or by computer systems and through computer networks that can result in accidental or intentional disruptions.
■Cyber security addresses not only deliberate attacks, such as from disgruntled employees industrial espionage, and terrorists, but also inadvertent compromises of the information infrastmcture due to user errors, equipment failures, and natural disasters.
●Introduction
■The objective of cyber security is to provide increased levels of protection for information and physical assets from theft, corruption, misuse, or accidents while maintaining access for their intended users.
■To achieve this objective the owner of the grid must take into account Cyber Security at every level of his organization by the management of an ongoing process that encompasses procedures, policies, technical (software, and hardware asset) and regulatory constraints. The following diagram outlines some of the associated topics.
Px4x 、 P141 、 P142 、 P143 、 P145 、 P241 、 P242 、 P243 、 P341 、 P342 、 P343 、 P344 、 P345 、 P391 、 P445 、 P44x 、 P442 、 P444 、 P44y 、 P443 、 P446 、 P54x 、 P543 、 P544 、 P545 、 P546 、 P642 、 P643 、 P645 、 P742 、 P741 、 P743 、 P746 、 P841A 、 P841B 、 P849 、 P14x 、 P24x 、 P34x 、 P64x 、 P74x |
|
|
|
|
|
User's Guide |
|
|
|
Please see the document for details |
|
|
|
|
|
|
|
English Chinese Chinese and English Japanese |
|
01/2020 |
|
|
|
Px4x/EN |
|
1.4 MB |
- +1 Like
- Add to Favorites
Recommend
All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.