Remote Control not only, but also for Energy Distribution Systems. Dr. Dietmar Gollnick CEO e*message Group CMA Spring Meeting 2016
|
|
- Dorcas Fleming
- 6 years ago
- Views:
Transcription
1 Remote Control not only, but also for Energy Distribution Systems Dr. Dietmar Gollnick CEO e*message Group CMA Spring Meeting 2016
2 Remember what is the truth.
3 1) It is not wise to remember what we know. But it could be useful to remember what unfortunately sometimes we have forgotten
4 Everything is IP. Single point of failure, too. Two sites of the medal: This is convenient This is dangerous
5 Communication channel is not dedicated to a terminal One smartphone at least 5 networks WIFI GPRS Bluetooth 800 MHz Band NFC 1800 MHz Band
6 Communication: many networks - one target Source: ETSI EmTel TS "Authorities to Citizen V1.2.1 ( )
7 The Secret of affordable much higher availability: Lowest correlation between used services is required. Service 1 Service 2 Composed Service Failure Rate 1 % + 0,5 % = 0,005 %
8 In Addition to To control Hundreds of Thousends of PROSUMERS is not any more to control some large power plants.
9 2) One practical case: How to control decentralized production and consumption of energy in the distribution network with a huge and growing number of renewable energy production facilities namely very volatile and unpredictable powersources
10 The requirements and the situation For example: Berlin. Germany. Europe. Ripple Control should be reinvested or should be replaced Long wave switching procedure far away not meeting (among others security) requirements Not finished yet discussion about what, why and how Smart Meter can influence
11 Ripple Control much to expensive Long Wave (EFR) not secure. See report from Prof. Dr. Christoph Ruland, University of Siegen Smart Meter is for... METERING. What is NOT Switching.
12 September 2014 Start of e*nergy Switching Technology in Berlin-Britz
13 * *Strom: german for Electricity Current Power Flux River Torrent (see: Google translation)
14 Security characteristics of new Smart Switching solution of e*nergy: Highest security and safety level through Usage of digital signatures Crypto algorithms regarding BSI TR Change of Signature Keys possible at any time over the air No private (secret) keys in the device by design Time synchronisation of receivers done by special authenticated messaging service Secure authentication of sender by receivers (only commands from valid sources will be executed)
15 Security characteristics This results in (among others) No threat from man-in-the-middle-scenario No threat from replay message(s) Intentionally disruption of Signal leads not to manipulations of switching content
16 3) Further Development(s)
17 Stabilisation and development of value chain
18 Monitoring and helping the legislation process
19 From Germany to Europe Who else is really moving new energy cases in Europe? Where can be found or build countrywide secure switching infrastructures? First: To talk with France. Smart Metering: Yes. Switching: t.b.d.
20 Use it outside energy distribution systems One example: Smoke detector infrastructure Other example: Other utility related needs
21 Integration, miniaturisation and using in hybrid environments +
22 Tell the easy stories Again and Again. Lower correlation means higher availability IP convenience can lead us to additional single points of failure One way communication cannot be attacked by the way back One way communication is cheap and can reach in one time many receivers Terminal device since a long time is not anymore connected and/or dedicated to only one service or network
23 Tell the easy stories Hardware integration can do a lot or almost all: hybrid solution for different services Highly integrated hybrid solution is cheaper than any other solution What is not secure should not be used Safety First
24 4) Some information about speaker and organisations
25 Speaker and Organisation Dr. Dietmar Gollnick CEO e*message Group e*message Wireless Information Service Group: Countrywide NP2M networks in Germany and France Partner in e*nergy: Stromnetz Berlin GmbH, Member of Vattenfall Group. Largest urbanonly energy distribution network in Germany. Internet: Blog:
26 Presentation Original presentation held at the Critical Infrastructure Protection & Resilience Europe Conference on 02/03/2016 (CIPRE) Abstract:
27 Impressions CIPRE
28 Impressions CIPRE II
29 Impressions CIPRE III
IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters
IDACCS Wireless 2014 Integrity protection in a smart grid environment for wireless access of smart meters Prof- Dr.-Ing. Kai-Oliver Detken DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen URL: http://www.decoit.de
More informationTopSec Mobile Secure voice encryption for smartphones and laptops
Secure Communications Product Brochure 02.00 TopSec Mobile Secure voice encryption for smartphones and laptops TopSec Mobile At a glance The TopSec Mobile is a mobile encryption device for secure worldwide
More informationCommunication Concept for Smart Metering, Smart Grid and Home Automation
Communication Concept for Metering, Grid and Home Automation Thomas Kessler (TKessler@telekom.de), Deutsche Telekom AG ETSI M2M Workshop, 26-27 October 2011, Sophia Antipolis, France 26/10/2011 1 Outline.
More informationTopSec Product Family Voice encryption at the highest security level
Secure Communications Product Brochure 01.01 TopSec Product Family Voice encryption at the highest security level TopSec Product Family At a glance The TopSec product family provides end-to-end voice encryption
More informationFemtocells : Inexpensive devices to test UMTS security
.... Femtocells : Inexpensive devices to test UMTS security Kévin Redon, Ravishankar Borgaonkar Technische Universität Berlin, SecT kredon/ravii@sec.t-labs.tu-berlin.de Hackito Ergo Sum 2011, 8 April 2011
More informationNIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April
NIS Platform Working Group 3 Individuals Digital Rights and Capabilities Dr. Gisela Meister April 08-2014 AoI 1: Individuals Digital Rights and Capabilities AoI 1 s vision is that individuals needs and
More informationThe Smart Home: A New Business Model. September 2014
The Smart Home: A New Business Model September 2014 What is a Smart Home? A smart home is described as a home equipped with lighting, heating, and electronic devices that can be controlled remotely by
More informationThe Internet of Light the key to the Internet of Things
The Internet of Light the key to the Internet of Things Tridonic s innovative net4more toolbox enables light to become the backbone of the Internet of Things. 13 March 2016 More connected devices than
More informationImplementing a Standard, Multi-Gateway: Real SmartHome in the Cloud
Implementing a Standard, Multi-Gateway: Real SmartHome in the Cloud Dr. Michael Westermeier Product Manager RWE SmartHome European Utility Week, Amsterdam, 15.10.2013 RWE Effizienz GmbH, European Utility
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More information4 6 May, 2009 Dubai, UAE
How to build an open, real-time Smart Metering and Smart Grid Platform with Broadband Powerline Ingo Schönberg CEO, Power Plus Communication AG, Germany 4 6 May, 2009 Dubai, UAE Content Company and Business
More informationWirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe
WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe Introduction Wireless devices are everywhere! We use wireless devices in everyday life.
More informationA generic model of an ICT-based energy system
A generic model of an ICT-based energy system Overview of the results of the VDE/ITG Position Paper Energy Information Networks and -Systems Dr. Jörg Benze T-Systems Multimedia Solutions GmbH joerg.benze@t-systems.com
More informationSecuring today s identity and transaction systems:! What you need to know! about two-factor authentication!
Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!
More informationSecure Routing for Mobile Ad-hoc Networks
Department of Computer Science IIT Kanpur CS625: Advanced Computer Networks Outline 1 2 3 4 Outline 1 2 3 4 Need Often setting up an infrastructure is infeasible Disaster relief Community networks (OLPC)
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationSmart City Solution & Case Study. LG Uplus
Smart City Solution & Case Study LG Uplus LG Group & LGU+ LG Group Overview LG Group Founded in 1947, LG Group now has 3 main business domains Portfolio Revenue (USD) 9.6 B 10.2 B 11.0 B 2015 2016 2017
More informationC2X Security. Introduction and overview (focus to European standard only) Cryptovision s Mindshare V
C2X Security Introduction and overview (focus to European standard only) Cryptovision s Mindshare 2015-06-24 V1.00 2015-06-24 Agenda What is Car2x Communication? Standards Security concepts C2X-PKI 2/30
More informationLeakDAS Version 4 The Complete Guide
LeakDAS Version 4 The Complete Guide SECTION 4 LEAKDAS MOBILE Second Edition - 2014 Copyright InspectionLogic 2 Table of Contents CONNECTING LEAKDAS MOBILE TO AN ANALYZER VIA BLUETOOTH... 3 Bluetooth Devices...
More informationAssessments Audits CERTIFICATION
IT SECURITY Cyber Security Training Consulting Analyses Assessments Audits CERTIFICATION Increasing connectivity of equipment, systems and applications in cyberspace networks harbours additional risks.
More informationEasy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc
EIT, Author Gay Robertson, 2016 Desktop PC Made up of system unit, keyboard, monitor, mouse Relatively cheap but not portable and take up a lot of space Are versatile You can add extras for speed or storage
More informationcom.beck energy Solutions for the Electricity Market
com.beck energy Solutions for the Electricity Market com.tom energy Electricity on the move The electricity market is currently facing new challenges. Renewable energy, e-mobility and sustainable energy
More informationTrojan-tolerant Hardware & Supply Chain Security in Practice
Trojan-tolerant Hardware & Supply Chain Security in Practice Who we are Vasilios Mavroudis Doctoral Researcher, UCL Dan Cvrcek CEO, Enigma Bridge George Danezis Professor, UCL Petr Svenda CTO, Enigma Bridge
More informationBUILDING AUTOMATION OF THE FUTURE
BUILDING AUTOMATION OF THE FUTURE BUILDING AUTOMATION OF THE FUTURE Building automation over IP: With its revolutionary Smart Building concept, MICROSENS enables building automation at low cost. Because,
More informationThe German IT Security Certification Scheme. Joachim Weber
The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES
CONTEXT- AWARE SECURIT Y THROUGH RAIN RFID ADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES H A R D W A R E S O F T W A R E W I R E L E S S / N E T W O R K S Cold-Boot Attacks Chip-Extraction Side-Channel Attacks
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationMarkus Bartsch. German Smart Metering and European Privacy Needs
Markus Bartsch German Smart Metering and European Privacy Needs Smart Grid (and Metering) Customer Satisfaction 3 Years 3 10 Years Identity Management Asset Management Feeder Automation Smart Meters Privacy
More informationICT IGCSE Theory Revision Presentation 1.4 Types of computer
Describe the characteristics of a personal/desktop computer and its uses, both as a standalone and networked computer Describe the characteristics of a laptop computer and what it is used for, both as
More informationLeveraging the full potential of NFC to reinvent physical access control. Friday seminar,
Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses
More informationThe energy sector reloaded
1 The energy sector reloaded Association of Energy Market Innovators 2 Discourse at bne is very much in line with our approach as a network company. That s because the combination of expertise across sectors,
More informationAuthentication Part IV NOTE: Part IV includes all of Part III!
Authentication Part IV NOTE: Part IV includes all of Part III! ECE 3894 Hardware-Oriented Security and Trust Spring 2018 Assoc. Prof. Vincent John Mooney III Georgia Institute of Technology NOTE: THE FOLLOWING
More informationSpring It takes a really bad school to ruin a good student and a really fantastic school to rescue a bad student. Dennis J.
Operating Systems * *Throughout the course we will use overheads that were adapted from those distributed from the textbook website. Slides are from the book authors, modified and selected by Jean Mayo,
More informationRadio Frequency Radiation What is it? What are the health risks of exposure? Thomas Engel
Radio Frequency Radiation What is it? What are the health risks of exposure? Thomas Engel About me Retired UW chemistry professor Local 20/20 Energy Action Group moderator Member PUD Citizen Advisory Board
More informationWireless Technologies for Smart Homes
Wireless Technologies for Smart Homes November 2013 www.ulealliance.org Avi Barel Director of Business Development ULE Alliance a.barel@ulealliance.org Technologies to Make Our Lives Better SMART GRIDS
More informationMAKING BUSINESSES SMARTER AND SIMPLER MONITORING MORE EFFECTIVELY REAPING THE BENEFITS OF IOT CONNECTIVITY
MAKING BUSINESSES SMARTER AND SIMPLER MONITORING MORE EFFECTIVELY REAPING THE BENEFITS OF IOT CONNECTIVITY INTERNET OF THINGS (IOT): THE NEXT MAJOR TECH DISRUPTOR BIGGER THAN SMARTPHONES CONNECTING EVERYTHING
More informationIntroduction. Chapter 1: Mobile Communications SS A case for mobility History of mobile communication Market Areas of research
Mobile Communications SS 2002 Chapter 1: Introduction A case for mobility History of mobile communication Market Areas of research Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02
More informationIoT Security Fundamentals That Must Be Solved. Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016
1 IoT Security Fundamentals That Must Be Solved Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016 2 1. IoT products must die 2. Rosetta stone 3. Thanks' for letting me in!
More informationCANoe.Car2x. Product Information
Product Information Table of Contents 1 Introduction... 3 1.1 Benefits at a Glance... 4 1.2 Application Areas... 4 1.3 Further Information... 6 2 Functions... 6 3 Hardware... 10 4 Training... 10 V1.5 02/2017
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss
More informationFemtocell: Femtostep to the Holy Grail
.... Femtocell: Femtostep to the Holy Grail Ravishankar Borgaonkar, Kévin Redon Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
More informationSeamless integration of heterogeneous wireless network technologies -?/!
Seamless integration of heterogeneous wireless network technologies -?/! Jochen Schiller Computer Systems & Telematics Freie Universität Berlin Germany schiller@computer.org Prof. Dr.-Ing. Jochen Schiller,
More informationProtection Profile for the Gateway of a Smart Metering System Combining privacy protection with security for the grid
Protection Profile for the Gateway of a Smart Metering System Combining privacy protection with security for the grid Dr. Helge (BSI) 12th ICC, 29.9.2011 A Possible Smart Grid 2 Introduction Smart Meter
More informationClouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018
Clouds and Things Implications of the Cloud and Internet-of-Things for SCADA/ICS April 25, 2018 Agenda for this presentation Overview of the Cloud, Fog & Internet-of-Things IoT device capabilities IoT
More informationFrom Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com
From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,
More informationSmart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities
Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Driving Forces The Smart City Concept Components of a Smart City Smart City Infrastructure
More informationApplied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr.
Applied IT Security Device Security Dr. Stephan Spitz Stephan.Spitz@gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System Security
More informationCTIS 487: Lecture Notes 1
CTIS 487: Lecture Notes 1 Mobile phones got their name due to the fact that they allow users to make phone calls while being mobile. The communication architecture was dominated by base stations communicating
More informationDefenses against Wormhole Attack
Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes
More informationThis paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems.
White Paper 1 INTRODUCTION As ICAO 1 -compliant epassports come into widespread use in Q4 of 2006, it is an appropriate moment to review some of the initiatives required for the next stage of development.
More informationCLOUD BACKUP. The simple guide to avoid losing digital assets in the cloud age
CLOUD BACKUP The simple guide to avoid losing digital assets in the cloud age EASY COME, EASY GO Many companies and organizations only fully understand the value of their data once it is lost. Information
More informationHow to operate virtual power plant. How it Works. cybergrid 2014 A TOSHIBA Group Company
How to operate virtual power plant. How it Works. cybergrid introduction Board of Directors Chairman: Atsutoshi NISHIDA President & CEO Mr. Hisao TANAKA Developer and deployer of VPP/DR solutions for Utilities
More informationCyber Smarts Using Social Media Wisely
Cyber Smarts Using Social Media Wisely Posted on March 24, 2016 by Shridevi Stock Photo You have access to the world s largest museum, art gallery, library and social group ever created. You also have
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationSmart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security
Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services
More informationPublic Review: Comments on Draft ETSI SR V0.0.4 ( )
Public Review: Comments on Draft ETSI SR 019 020 V0.0.4 (2013-11) Rationalised Framework of Standards for Advanced Electronic Signatures in Mobile Environment> Organization Technical/) -X The document
More informationEBV Personalization Services for Security Devices
Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationOrganising . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising-
Organising email Reading emails When someone sends you an email it gets delivered to your inbox, which is where all your emails are stored. Naturally the first thing you ll want to do is read it. In your
More informationNETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY.
NETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY. MACMON MODULE & BUNDLES DEVELOPMENT It is macmon s mission to improve and further develop its products. Exciting extensions are currently being worked
More informationDATA SHEET VANGUARD AUTHENTICATORTM KEY FEATURES:
VANGUARD TM Vanguard Authenticator is a scalable, modular and integrated authentication solution that enables enterprises to control authentication and authorization to their enterprise. Authenticator
More informationThe Smart Grid Security Innovation Alliance. John Reynolds October 26, 2011 Cambridge, Massachusetts
The Smart Grid Security Innovation Alliance John Reynolds October 26, 2011 Cambridge, Massachusetts The SGSIA addresses the entire ecosystem. The Smart Grid Security Innovation Alliance is a working association
More informationBluetooth low energy security, how good is it? Petter Myhre Bluetooth World, San Jose March 2017
Bluetooth low energy security, how good is it? Petter Myhre Bluetooth World, San Jose March 2017 Common Types of Attack Man-In-The-Middle Passive Eavesdropping Man-in-the-Middle (MITM) attack Active eavesdropping
More information6.857 L17. Secure Processors. Srini Devadas
6.857 L17 Secure Processors Srini Devadas 1 Distributed Computation Example: Distributed Computation on the Internet (SETI@home, etc.) Job Dispatcher Internet DistComp() { x = Receive(); result = Func(x);
More informationRadiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards.
Radiocommunications in industry : the key features of ISA 100 solutions Standards Certification Education & Training Publishing Conferences & Exhibits Jean-Pierre Hauet KB Intelligence ISA District 12
More informationGetting to Grips with Public Key Infrastructure (PKI)
Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue
More informationConnected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is
Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin
More informationHow to master hybrid IT. Get the speed and agility you want, with the visibility and control you need
How to master hybrid IT Get the speed and agility you want, with the visibility and control you need The process of moving from a dedicated hosted server to the cloud was seamless. Dimension Data s platform
More informationCyberP3i Course Module Series
CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls
More informationOrange Smart Cities. the ICT partner for innovators in the urban space
Orange Smart Cities the ICT partner for innovators in the urban space Orange Smart Cities offer ICT solutions for large city infrastructures and services to the citizen ETSI Smart Cities Workshop, 3-4
More informationKeysight Technologies Monitoring the Control Panel Temperature
Keysight Technologies Monitoring the Control Panel Temperature Capture the temperature easily with Keysight s handheld digital multimeters during troubleshooting Solution Brochure In a world governed by
More informationThe Next Generation of Credential Technology
The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.
More informationAsset Management conference 2016
Asset Management conference 2016 The changing face of Asset Management 27 September 2016 2016 Grant Thornton Ireland. All rights reserved Cyber security 27 September 2016 Mike Harris Partner Grant Thornton
More informationQuestions & Answers From Thursday, September 16 Webinar Alternatives Case Examples Frequency and Spectrum Planning Security WiMAX Capabilities
Questions & Answers From Thursday, September 16 Webinar Alternatives Case Examples Frequency and Spectrum Planning Security WiMAX Capabilities Alternatives Q: How about PLC? Is it a viable alternative
More informationReasons to connect your tools
7 Reasons to connect your tools Why test and measurement tools are better together with Fluke Connect 1 phone anytime, Work faster The Fluke Connect app helps you conduct routine maintenance tasks and
More informationDigital Transformation Process of a Utility
Roland Stader Head of Energy Automation, Telecommunications & IT Digital Transformation Process of a Utility Stadtwerke Konstanz GmbH Max-Stromeyer-Str. 21-29 78467 Konstanz Tel.: +49 (0) 7531 803 4800
More informationDistributed Pervasive Systems
Distributed Pervasive Systems CS677 Guest Lecture Tian Guo Lecture 26, page 1 Outline Distributed Pervasive Systems Popular Application domains Sensor nodes and networks Energy in Distributed Systems (Green
More informationFactotum Sep. 24, 2007
15-412 Factotum Sep. 24, 2007 Dave Eckhardt 1 Factotum Left Out (of P9/9P Lecture) The whole authentication thing There is an auth server much like a Kerberos KDC There is an authentication file system
More informationNetwork Systems. Wireless Network. Claude Duvallet - 1/27
Network System Wireless Network Claude Duvallet University of Le Havre Faculty of Sciences and Technology 25 rue Philippe Lebon - BP 540 76058 LE HAVRE CEDEX, FRANCE Claude.Duvallet@gmail.com http://litis.univ-lehavre.fr/
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationTopSec Mobile Tap-proof phone calls
TopSec Mobile Tap-proof phone calls iphone Android smartphone PC Fixed network Satellite Secure Communications Product Brochure 03.00 TopSec Mobile At a glance The TopSec Mobile is a mobile encryption
More informationeidas Regulation eid and assurance levels Outcome of eias study
eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification
More informationPrivacy and Security in Smart Grids
Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012
More informationHow can the Future Internet
How can the Future Internet enable Smart Energy? Presented by Werner Mohr (Coordinator), Nokia Siemens Networks on behalf of the FINSENY project Smart Energy enabled by Future Internet Workshop FINSENY
More information17655: Discussion: The New z/os Interface for the Touch Generation
17655: Discussion: The New z/os Interface for the Touch Generation Thursday, August 13, 2015: 12:30 PM-1:30 PM Europe 2 (Walt Disney World Dolphin ) Speaker: Geoff Smith(IBM Corporation) 1 Trademarks The
More informationA better Connection for The Perth Convention Exhibition Centre
A better Connection for About the Perth Convention and and is Western Australia s premier event destination, serving over half a million people attending conferences and exhibitions each year. In today
More informationDIMETRA X CORE DATA SHEET DIMETRA X CORE
DIMETRA X CORE FOR GOVERNMENT ORGANISATIONS, PUBLIC SAFETY AGENCIES AND LARGE ENTERPRISES, MOBILE BROADBAND IS ON THE WAY. AND WHILE YOU DON T KNOW WHEN THAT CHANGE IS COMING YOU CAN BE READY FOR IT WITH
More informationPreventing (Network) Time Travel with Chronos. Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira
Preventing (Network) Time Travel with Chronos Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira Network Time Protocol (NTP) NTP synchronizes time across computer systems over the Internet.
More informationWHITE PAPER. The 450 MHz Band Ecosystem
WHITE PAPER The 450 MHz Band Ecosystem Introduction M2M communications, in which everyday objects and devices are online and able to interact with each other, have seen significant growth in recent years.
More informationIOT CONNECTIVITY DISRUPTED. powred by
1 IOT CONNECTIVITY DISRUPTED powred by 2 TOGETHER WITH 1NCE WE ARE ABOUT ENERGIZING YOUR BUSINESS AND CREATING NEW OPPORTUNITIES IN AREAS YET UNCHARTED. START YOUR GROWTH STORY BASED ON IOT CONNECTIVITY
More informationLegal Regulations and Vulnerability Analysis
Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information
More informationUPDATE YOUR AUTOMATION. Connect with the future of drive & control technology
UPDATE YOUR AUTOMATION Connect with the future of drive & control technology Customized Customized MACHINE CONTROL VIA SMARTPHONE The visionary concept from AMK Bring the digital revolution to your production.
More informationNFC is the double click in the internet of the things
NFC is the double click in the internet of the things Name Frank Graeber, Product Manager NFC Subject 3rd Workshop on RFID Systems and Technologies Date 12.06.2007 Content NFC Introduction NFC Technology
More informationVladimir Groshev. COO, Project Coordinator.
Vladimir Groshev COO, Project Coordinator If absolute anonymity and complete security is what you are looking for, Then SISHUB is what you need! 1. Anonymous STEEL Messenger 2. Built-in cryptocurrency
More informationData Center Cooling Market Research Report Forecast to 2023
Report Information More information from: https://www.marketresearchfuture.com/reports/1913 Data Center Cooling Market Research Report Forecast to 2023 Report / Search Code: MRFR/ICT/1381-HCRR Publish
More informationETSI standards are enabling a global M2M solution. Enrico Scarrone, ETSI TC M2M Chairman, Telecom Italia 3 ETSI M2M workshop, Mandelieu, France, EU
ETSI standards are enabling a global M2M solution Enrico Scarrone, ETSI TC M2M Chairman, Telecom Italia 3 ETSI M2M workshop, Mandelieu, France, EU From (smart) phones to a world.. made of intelligent and
More informationSmart Service Packs. Providing customer recruitment, retention & new revenue streams. 1 Smart Service Packs
Smart Service Packs Providing customer recruitment, retention & new revenue streams 1 Smart Service Packs Mobile messaging has been a runaway success, yet the basic service has changed little since its
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More information