Русские видео

Сейчас в тренде

Иностранные видео


Скачать с ютуб Webinar - The Easy Button for IEC 61850 Security Authentication and Encryption в хорошем качестве

Webinar - The Easy Button for IEC 61850 Security Authentication and Encryption 2 года назад


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



Webinar - The Easy Button for IEC 61850 Security Authentication and Encryption

PROBLEM: Layer 2 GOOSE has long allowed for event-based communication within a substation. As emerging 61850 use cases require communications to extend beyond a single substation, the need for a secure and routable solution has emerged. Secure Routable GOOSE (R-GOOSE) and Routable Sampled Values (R-SV) satisfies the security and communications requirements of the utility industry. SOLUTION: Secure R-GOOSE/R-SV requires that publishers and subscribers share a common symmetric key, which is distributed via a mechanism specified in IEC 62351-9. The engineering process of IEC 61850 allows for the configuration of publication groups, destination addresses for the publications, and addresses for key manage­ment for that group. The System Configuration Tool (SCT) stores this information in an SCL file, which can be leveraged by the Garibaldi Key Distribution Center (KDC) to simplify security configuration. WHAT YOU'LL LEARN: - Why it's important to use R-GOOSE & R-Sample Values and the need for security and review of real-life use cases - Learn about Key & Policy Exchange creating a Security Management Plane - Learn about Pull and Push Re-synchronization as defined by IEC 62351-9 - Discuss IEC 61850 Multicast Security in Real Time Plane - How to configure Garibaldi Key Distribution Center using SCL to save time & minimize configuration mistakes - Learn the impacts of security on a simulated system using Distributed Test Manager (DTM) https://www.trianglemicroworks.com/pr... - Learn how Authentication and Encryption is used to protect against Spoofing, Snooping, and other Man in the Middle Attacks

Comments