Analysis of EMS Outages. Venkat Tirupati, Senior Reliability Engineer NERC Monitoring and Situational Awareness Conference September 18, 2013

Size: px
Start display at page:

Download "Analysis of EMS Outages. Venkat Tirupati, Senior Reliability Engineer NERC Monitoring and Situational Awareness Conference September 18, 2013"

Transcription

1 Analysis of EMS Outages Venkat Tirupati, Senior Reliability Engineer NERC Monitoring and Situational Awareness Conference September 18, 2013

2 Agenda Introduction Analysis of Restorations Contributing & Root causes with examples Common themes with examples Q & A 2

3 Introduction Energy Management Systems (EMS) are extremely reliable EMS outages increase the risk to the reliability of the grid 81 Category 2b events (Oct 26, 2010 Sep 3, 2013) reported 64 events thoroughly analyzed and reviewed 54 entities reporting - 20 entities experiencing multiple outages Restoration time for partial outages: 18 to 411 min Restoration time for complete outages: 12 to 253 min Vendor agnostic failures Software & Hardware Issues Several noticeable themes 3

4 Time in Minutes Analysis of Restoration Times Mean Complete Outage Restoration Time: 56 Minutes Mean Partial Outage Restoration Time: 43 Minutes Mean Total Outage Restoration Time: 99 Minutes Mean Outage Restoration Time Mean Complete Outage Restoration Time Mean Partial Outage Restoration Time Mean Complete Outage Restoration Time Mean Partial Outage Restoration Time Complete Outage Restoration Time Partial Outage Restoration Time Mean Complete Outage Restoration Time Mean Partial Outage Restoration Time Mean Outage Restoration Time 4

5 Number of Events Title Restoration Time 10- Minute Interval Restoration Time Restoration Time 10 Minute Intervals 5

6 Time in Minutes Outage Restoration Times by Date 450 October 26, 2010 September 3, Complete Outage Restoration Time Partial Outage Restoration Time 6

7 Number of Reported Outages Number of Reports - Quarterly 12 October 26, 2010 September 3, Q Q Q Q Q Q Q Q Q Q Q Q3 7

8 Number of Events Characteristics of the EMS outages 90 Weekend Non-CIP Unforeseen Weekday 31 CIP Planned 10 0 Outages on Weekdays/Outages on Weekends CIP activity led to outage/non-cip activity led to outage Outage due to Planned Activity/Outage Unforeseen 8

9 Number of Events Outage Time of the day (2 Hr Intervals) :00-2:00 2:00-4:00 4:00-6:00 6:00-8:00 8:00-10:00 10:00-12:00 12:00-14:00 14:00-16:00 16:00-18:00 18:00-20:00 20:00-22:00 22:00-24:00 Outage due to Planned Activity Outage Unforeseen 9

10 Root Causes By Category AZ - Information LTA, 11, 20% A1 - Design/Engineering, 9, 16% A6 - Training, 1 A5 - Communication, 3 A2 - Equipment/Material, 14, 25% A4 - Management/Organizati on, 17, 30% A3 - Individual Human Performance, 1 10

11 Root Causes Top Root Causes Software Failure (A2B6C07) Testing of Design/Installation LTA (A1B4C02) Information to determine cause LTA (AZ) Insufficient Job scoping (A4B3C08) Inadequate risk assessment of change (A4B5C04) Post modification testing LTA (A2B3C03) Design output scope LTA (A1B2C01) Vendor or contractor involved (AZB3C02)

12 Contributing Causes By Category A1 - Design/Engineering, 41, 18% A3 - Individual Human Performance, 22, 9% A5 - Communication, 15, 6% AX - Overall Configuration, 12, 5% A7 - Other, 5, 2% A2 - Equipment/Material, 74, 32% A4 - Management/Organizati on, 64, 28% 12

13 A2B6C07 A1B2C01 A4B5C03 A1B4C02 A2B6C01 A4B5C05 A4B5C04 A2B3C03 A2B3C02 A3B3C01 A4B1C08 A1B2C08 A3B2C01 A4B3C08 A4B5C13 A7B1C02 AX AXB1 A1B2C05 A2B2C01 A2B3C01 A3B1C01 A3B2C05 A3B3C04 A4B2 A4B2C08 A4B3 A4B3C09 A4B5C01 A4B5C09 A5B2C08 A5B4C01 AXB2 A1 A1B1 A1B1C01 A1B1C03 A1B2C09 A1B3C01 A1B5C02 A1B3C02 A2B1C02 A2B7C01 A2B7C04 A2B6C05 A3B1C03 A3B1C04 A3B1C06 A3B2C02 A3B2C04 A4B1 A4B1C03 A4B1C04 A4B1C06 A4B1C05 A4B1C09 A4B2C07 A4B3C11 A4B4C05 A4B5 A4B5C02 A5 A5B1C01 A5B1C03 A5B1C05 A5B2 A5B3C01 A5B4C06 A6B3 A7B1 Contributing Causes Top Contributing Causes Software Failure (A2B6C07) Design output scope LTA (A1B2C01) Inadequate vendor support of change (A4B5C03) Testing of Design/Installation LTA (A1B4C02) Defective or failed part (A2B6C01) System Interactions not considered (A4B5C05) Inadequate risk assessment of change (A4B5C04) Post Modification Testing LTA (A2B3C03) Inspection/Testing LTA (A2B3C02) Attention given to wrong issues (A3B3C01) Untimely corrective actions to known issue (A4B1C08)

14 Equipment/Material - Sub-Categories A2B2 - Periodic/Corrective Maintenance LTA A2B3 - Inspection/Testing LTA A2B6 - Defective or Failed A2B7 - Equipment Interactions LTA 14

15 Management/Organization Sub-Categories A4B5 - Change Management LTA A4B1 - Management Methods LTA A4B3 - Work Planning Organization LTA A4B2 - Resource Management LTA A4B4 - Supervisory Methods LTA 15

16 Top Root/Contributing Causes Software Failure (A2B6C07) Design output scope LTA (A1B2C01) Inadequate vendor support of change (A4B5C03) Testing of Design/Installation LTA (A1B4C02) Defective or failed part (A2B6C01) System Interactions not considered (A4B5C05) Inadequate risk assessment of change (A4B5C04) Insufficient Job scoping (A4B3C08) Post Modification Testing LTA (A2B3C03) Inspection/Testing LTA (A2B3C02) Attention given to wrong issues (A3B3C01) Untimely corrective actions to known issue (A4B1C08) 16

17 Software Failure (A2B6C07) - Examples A tuning parameter on an AGC display was changed leading to a number greater than an acceptable parameter. There was no validation and it ended up generating an invalid array index and hence corrupted the database. A process that synchronizes data between Primary and Backup systems was aborting and continuously restarting the servers. SCADA application did not check for maximum number of control commands allowed and generated invalid keys that ultimately led to aborting of the application. Fortran array out of bound issues with control application due to a software bug A vendor supplied batch file did not have a proper command in a system wide script. Program to clean out log files was not deleting them leading to disk space issues 17

18 Software Failure (A2B6C07) - Examples Coding error in the alarm process code where in code generates a corrupt alarm when the concatenated string size of RTU and associated points size is more than 80 characters. EMS vendor revealed to the entity that the Delete operation used to remove previous database files before updating the configuration database had intermittently been unreliable at other installations. A process to purge data files created for supporting outage management system had bug and the process filled up the hard disk. This caused the entity to lose control functionality. Failover setting parameter issue led to failover process failing Synchronization settings between the PCC and BCC domain servers Failover program did not account for failure of certain critical applications Unreleased semaphores clogging the system virtual memory and leading to failed integrity checks between EMS servers 18

19 Software Failure (A2B6C07) - Examples A program locked a file and caused exhaustion of system resources Rapid Spanning Tree Protocol incompatibilities and memory leak issues with communication equipment software Bug in the router software regarding spanning tree protocol Router encountered a software bug that prevented it from refreshing its mapping between Layer 2 and Layer 3 addresses A health check software had bugs Messaging program had software bugs and was restarting critical programs continuously EMS applications start up scripts had bugs Windows clustering functionality problems Automated propagate script failed to replicate the changes due to incorrect host names. The start/stop script did not successfully abort the program. Display build process failing due to Java heap memory issues 19

20 Top Root/Contributing Causes Software Failure (A2B6C07) Design output scope LTA (A1B2C01) Inadequate vendor support of change (A4B5C03) Testing of Design/Installation LTA (A1B4C02) Defective or failed part (A2B6C01) System Interactions not considered (A4B5C05) Inadequate risk assessment of change (A4B5C04) Insufficient Job scoping (A4B3C08) Post Modification Testing LTA (A2B3C03) Inspection/Testing LTA (A2B3C02) Attention given to wrong issues (A3B3C01) Untimely corrective actions to known issue (A4B1C08) 20

21 Design output scope LTA (A1B2C01) - Examples The firewall manager tool did not have a prompt to warn the user about the firewall name change. Vendor has been contacted and will implement the barrier in the tool. An automated script from the vendor replicates the changes made on a server to all the other needed servers. However the automated script did not have the correct host names of the servers. This led to the repeated SSH attempts to reach the servers to fail and led to the outage. Design of the NAT was not compatible with the protocols used on front end processor servers and prevented a successful failover. Lack of redundancy with NIC cards led to network communication issues leading to EMS outage. A network device configuration change was made, but failover scenario was missed, leading to failure of failover on demand. Incorrectly defined routing paths for SCADA network There was no networking capability, independent from the primary control facility network, to access the BCC directly. 21

22 Design output scope LTA (A1B2C01) - Examples Entry of an a tuning parameter on a display, with a value greater than the allowed parameter, resulted in an invalid array index and led to corruption of the database. The tool should have had proper validation capability and not let the user enter invalid information. AGC paused due to bad telemetry inputs and most telemetry inputs failed over to the alternate tone channels. But there were some points, which did not have alternate signals and it was not very clear which inputs had failed. A procedure to identify the failed points is in place and a new display that shows AGC telemetry and status is installed. There was no automated process to routinely ensure that file system disk space levels were well below the warning thresholds on EMS servers. Failover configuration settings were not set according to the latest vendorestablished standard configuration and this was leading to a repeated transition for SCADA server from online to backup mode interrupting communications from RTU. Greater than normal utilization of study applications led to depletion of virtual memory and RAM. System design did not consider the impact of study applications on performance. 22

23 Inadequate Vendor Support of Change (A4B5C03) - Examples Vendor overlooked the setting for automatic site failovers and left it enabled. The entity wanted it to be manual. No viable implementation of current entity s version at the EMS vendor site to test changes Disabling of control records was crashing the control application. SCADA vendor was contacted before the implementation of NAT on the SCADA network and the vendor provided no technical objections or recommendations. Design of the NAT was not compatible with the protocols used on front end processor servers and prevented a successful failover. A vendor did not test a system wide batch script before sending it to the entity. Entity ran it and that led to loss of RTU communications for the entire network. Vendor was asked for help with unresponsive domain controller to system DNS requests and why DNS service on one domain controller did not failover to another. Vendor suggested articles and suggestions but did not provide much help in diagnosing the event. 23

24 Inadequate Vendor Support of Change (A4B5C03) - Examples The vendor supplied batch file did not come with good instructions. Vendor moved on to supporting another package than the one provided to entity Vendor patches provided for the RTU communications problem did not fix the problem entity was experiencing. Vendors could not figure out the issue with the clustering problems A joint initiative application with vendor was developed. But the entity and the vendor did not foresee the loading on the production system. Software vendor recommendation for memory specifications did not account for this new application. 24

25 Testing of Design/Installation LTA (A1B4C02) - Examples A new port scanning tool was testing against a subset of systems and showed no impact. But, after the event, the tool was validated in another test environment similar to real time and the half open issue & non-responsive EMS servers was reproduced. An entity did not adequately test the NAT implementation prior to implementing on production SCADA network. The design was not compatible with the protocols used on the front end processors and prevented a successful failover When an automatic site failover occurred due to network interruption, operators were not trained to login to SCADA backup server domain. This was not tested prior to the incident. The FAT testing did not have test steps to test the control application when control records are manually disabled in SCADA. When new functions are tested, scale of operations need to be considered and not just the operation itself. A new Group control function was tested on 5 breakers and then applied to 300 breakers. This resulted in crashing of SCADA application. This could have been easily tested on a test system, even though controls are not truly sent to RTUs. 25

26 Testing of Design/Installation LTA (A1B4C02) - Examples A new firewall security patch was not tested prior to implementing it on the system Entity did not confirm with the vendor that a batch meant to correct the timing alarms out of substation equipment, was run in a test environment that simulates a system configuration prior to running on the live system. During the test of a new RTU on the SCADA FEP, RTU and associated point concatenated name length was not tested as it generated a corrupt alarm. During testing it was noticed one of the variable was not getting calculated. Staff noticed that one step was missed. Instead of testing the recovery method on development system, the missing step was directly run on the production environment. The instruction was mistyped and accidently initialized all global AGC parameters. Passwords were changed on the system, but the critical applications were not tested to ensure their normal functionality. 26

27 Defective or a Failed Part (A2B6C01) - Examples Faulty NIC Cards Auxiliary power regulator control in the Regulator control panel was the failed component Fiber optic cable lost Failed cards in Digital Cross Connect Fault within a range of ML-1000 card revisions Octal T1 (Card 2) in the SPO DNX and card 2 s failure to failover to card 1 properly. UPS module failure led to power outage for aggregation switch. Failure of fiber optic interface card Bypass switch on the MUX UPS UPS battery bank failed. Blown circuit boards and fuses due to depletion of temporary batteries. 27

28 System Interactions not considered (A4B5C05) - Examples Firewall changes and interaction with program that copies files between two servers not considered. Firewall changes and the impact of authentication to backup servers when failover happens not considered. A new port scanning tool, was designed to look for ports that were open. But before it was ran, the interaction that it would have with ports that were excluded by other scanning tools, was not considered, leading to half open connections, excessive resource consumption and non-responsive EMS servers. Power outage for redundant router and its impact on the EMS system was not considered in the design. Alarm program application crash impact on rest of the EMS system not considered. 28

29 System Interactions not considered (A4B5C05) - Examples An IOS upgrade and its impact on the processing of Access Control Lists (ACL) was not considered before the upgrade. This led to overloading of CPUs of critical redundant routers, prevented network traffic from reaching the destination and left dispatchers with no consoles. Without information from the vendor, considering these system interactions is very difficult. Spurious data in the EMS runback calculation when the system restarts. A software application is not properly deleting the information on a restart. The impact of manually disabled SCADA records and its effect on control application were not considered during the testing phases. The impact of powering down of one critical router that stores and distribute the encryption scheme was not considered. The impact of number of study application users on the performance of the EMS system was not considered when the EMS system was designed. Performance testing would have prevented this issue. 29

30 Risk Associated with Change not Identified (A4B5C04) - Examples Change to access BCC from PCC consoles led to unnecessary dependency between domain servers Testing changes on the primary servers but not on backup site servers. Failover did not work. An ICCP build process was rebuilding other databases which were not needed. Asymmetrical routing. Routing protocol paths were changed for SCADA circuits, without considering backup system. System performance was degrading, but still additional data imports and adding non-critical data was being performed on the system. A new group control feature was tested on 5 breakers and later applied to 300 breakers, which led to SCADA application crashing. The data center power distribution unit (PDU) B has tripped offline.. This left the EMS servers with only the single feed from the A PDU. This resulted in voltage fluctuation of sufficient size to have caused the EMS servers to restart. 30

31 Risk Associated with Change not Identified (A4B5C04) - Examples A custom program that had been disabled had not been completely disabled. This resulted in data files which accumulated without the corresponding cleaning program functionality occurring. The encryption solution for the SONET ring uses two centralized key routers. System was running out of Backup because of maintenance work on the UPS systems. When the redundant UPS was also taken out of service, the impact on the communications was not considered. A change to the base log-on configuration that impacted both PCC and BCC was not tested for dependency issues. A test plan was created to create interdependency between PCC & BCC control systems. A UPS was out of service for emergency maintenance and it was primary source of power for certain critical communication equipment. Temporarily power was being sourced from another building via power cables since moving the equipment would have led to an outage. Entity took the chance that the building power would not go away. But because of a fault it did and SCADA communications was lost. 31

32 Insufficient Job Scoping (A4B3C08) Examples A requirement for failover was missing and, therefore, the system was unable to failback to the PCC on demand. Job scoping should have identified this. A recent network device configuration change was made, but failover scenario was missed. A new port scanning tool was tested against a subset of systems and the test results showed no impact. But when the scan was run against real time network and servers including EMS servers, denial of service resulted because of half open connection consuming excessive computing resources. The tool was run with default options and not configured and tuned to the entity s network, unlike other tools which were heavily tuned. The job scoping process was less than adequate to gauge special circumstances/conditions. Backup control center functionality if typically tested for transfer of EMS functionality and the routing of data, but the power still available to data center systems as primary control center. Job scoping of UPS system maintenance at PCC, did not consider the fact that some of the devices can be powered off and lead to suspect data at the present operations center. 32

33 Insufficient Job Scoping (A4B3C08) Examples Network configuration was changed by disabling auto-negotiation on Ethernet interfaces and changing from switch based failover to router based failover. But the scoping did not consider that every EMS server needed to have its default gateway changed to reflect the router based failover. When link between BCC & PCC failed, EMS system failed due to excessive broadcasts from FEP due to incorrectly defined default gateway. The corruption of the FEP database occurred after exceeding the 30,000 FEP point count limit and resulted from an early exit from the FEP build process leaving several critical columns blank in the FEP database. No errors were noted in the offline builds while a FEP build in the production environment of the same FEP database showed extensive errors due to missing data in critical fields. 33

34 Post Modification/Maintenance Testing LTA (A2B3C03) - Examples Authentication server failover tested once, but not after all the firewall changes over time. Implementation of RSTP not tested after changing network configuration Testing changes on the primary servers but not on backup site servers. Failover did not work. Network device configuration changed and tested only on the primary system Firewall software changes were not tested against existing critical program functionality After installing IOS upgrades on critical redundant switches, impact of the changes on the network was not monitored, until traffic was denied a few days later. 34

35 Post Modification/Maintenance Testing LTA (A2B3C03) - Examples A network device configuration was changed to prevent unauthorized access to SCADA system. Testing was performed to verify a network configuration change. Network and system logs were scanned for errors and the system was monitored before, during and for a period after the configuration change. However, failover testing was not performed and a latent issue was left uncovered. If testing was performed to verify BCC connectivity to the substation circuits when their routing paths were updated as a result of a change, the event could have been avoided. The testing process for the change only tested the connectivity to the primary control center EMS network and not the BCC network. The asymmetrical routing situation would have been detected during the tests. During a DNS flexible Single Master Operation (cluster move) the GUI requested permission to elevate the privileges. This should not have occurred and revealed a configuration problem with the clustering. A permission setting for the clustered pair was not remaining set permanently until one of the network folks elevated his privileges and made the change. 35

36 Inspection Testing LTA (A2B3C02) - Examples Inter-dependency of the domain servers was not tested properly Regression testing not conducted after password changes - FTP caused too many pings Failover to backup site was not conducted but only paper tests were performed A joint initiative between vendor and entity led to the development of an application but the loading on the application and its impact on the system was not tested prior to installation on the production system. A change to the base log-on configuration that impacted both PCC and BCC was not tested for dependency issues. A test plan was created to create interdependency between PCC & BCC control systems. Due to distribution feeder switch lockout, the power to PCC was lost and all the telephone systems lost power. The backup phone battery was bad and failed within a very short time. The testing of the emergency backup phone system was not performed thoroughly. 36

37 Attention to Wrong Issues (A3B3C01) - Examples The network admin neither had any formal training nor on the job training. Hence, he was not aware of the tool that he was using to make the firewall description changes and was also not aware of the risks involved in the changes. Hence, this is a knowledge based individual human performance error. An EMS support engineer who was called in to assist with alarms, realized that he could not login to EMS system, thought that the problem was with EMS server # 1 and initiated a failover to backup EMS server #2. Because of replication issues, failover did not work. Engineer did not realize that the failover had halted. Engineer stopped the process manager on server # 1. Failover did not work to #2 and did not failback to #1 because of stopped process manager. The engineer later realized that it was a network issue. 37

38 Untimely Corrective actions to known problem (A4B1C08) - Examples A week old standing alarm made quick diagnosis impossible. DNX was already in alarm before a card failed. The corrective action to replace a part and clear the alarm was untimely. An overloaded UPS at PCC was being swapped with transported BCC UPS. But it turns out that they were not interchangeable even though, they passed the eye test with same specifications. 38

39 Common Themes Common themes 1. Software Failures 2. Software Configuration/Installation/Maintenance 3. Hardware Failures 4. Hardware Configuration/Installation/Maintenance 5. Failover Testing Weaknesses 6. Testing Inadequacies 39

40 Software Failures Application Software Bug/Defect Base System Alarms/Health Check/Syncing etc. Front End Processing (CFE/FEP/DAC/FCS) Supervisory Control Applications (SCADA) Automatic Generation Control (AGC) Inter Control Center Communication Protocol (ICCP) User Interface (UI) Relational Database Management Systems (RDBMS) Build Process Scripts Miscellaneous Scripts for clean up, start up, cron jobs etc. Communication Equipment Firmware/Software Bug/Defect Remote Terminal Units Switches Modems Routers Firewalls Operating System Software Bug/Defect Unix/Linux/Windows 40

41 Common Themes Common themes for EMS Outages: 1. Software failures 2. Software Configuration/Installation/Maintenance 3. Hardware Failures 4. Hardware Configuration/Installation/Maintenance 5. Failover Testing Weaknesses 6. Testing Inadequacies 41

42 Software C/I/M Improper sizing of parameters Improper user/application permission issues Incorrect application parameter settings Incorrect database settings/configuration Critical Infrastructure Protection (CIP) installation issues Improper installation of patches Improper propagation of changes to Spare/Backup servers. Improper patch management Timing/Application etc. Improper maintenance of programs/patches Incorrect recovery procedures Missing documentation for programs/procedures etc. Improper security policy configuration changes External program configuration issues (Anti Virus, Service Oriented Architecture (SOA) services etc.) Improper configuration of security tools 42

43 Hardware Failures Application Servers/Nodes NIC cards Server hard drive control board Aux Power regulator control Communication Equipment Remote Terminal Unit (RTU) Switches Routers Firewalls Fiber Optic Cables Time source Power Sources Uninterruptible Power Supply (UPS) External Generators Power Cables 43

44 Hardware C/I/M Improper server redundancy set up Improper power sources redundancy Improper Local /Wide Area Network (LAN/WAN) configuration Improper routing of power paths Incorrect communication network settings Improper disk/memory sizing Improper settings on routers/switches etc. Improper server clustering Improper time source configuration 44

45 Failover Testing Weaknesses Improper settings preventing the failover Improper procedure to failover System setup issues preventing failover Improper patch management between primary/spare/backup servers Primary server issues reflected on spare/backup as well No Isolation Improper failover configurations settings Improper network device configuration settings for failover Design requirements not considering failovers 45

46 Testing Inadequacies Inadequate Improper procedures to test Incomplete scope Not engaging all the parties involved 46

47 Restoration Time in Minutes Event Count SW & HW Categories & Restoration Times Hardware C/I/M Hardware Failure - Com Hardware Failure - Hardware Failure - Software Failure - Power Server App Software Failure - Com Software C/I/M 0 Mean Outage Restoration Time (Mins) Event Count 47

48 Venkat Tirupati Senior Reliability Engineer office cell 48

Analysis of EMS Outages

Analysis of EMS Outages Analysis of EMS Outages Venkat Tirupati, LCRA, Supervisor EMS & Advanced Applications NERC 2 nd Annual Monitoring and Situational Awareness Conference September 22, 2 Agenda Introduction Common themes

More information

Analysis of EMS Outages

Analysis of EMS Outages Analysis of EMS Outages Venkat Tirupati, LCRA, Supervisor EMS SW & Advanced Applications NERC 3 rd Annual Monitoring and Situational Awareness Conference September 29-30, 2015 Agenda Introduction Common

More information

Member Representatives Committee. Pre-Meeting and Informational Webinar January 16, 2013

Member Representatives Committee. Pre-Meeting and Informational Webinar January 16, 2013 Member Representatives Committee Pre-Meeting and Informational Webinar January 16, 2013 Objectives Review preliminary agenda topics for February 6 Member Representatives Committee (MRC) meeting. Review

More information

Root cause codes: Level One: See Chapter 6 for a discussion of using hierarchical cause codes.

Root cause codes: Level One: See Chapter 6 for a discussion of using hierarchical cause codes. Root cause codes: See Chapter 6 for a discussion of using hierarchical cause codes. Level one is where the cause is found, levels two and three are what the cause is, in increasing detail. While many level

More information

Agenda Event Analysis Subcommittee Conference Call

Agenda Event Analysis Subcommittee Conference Call Agenda Event Analysis Subcommittee Conference Call October 23, 2013 11:00 a.m. 1:00 p.m. Eastern Ready Talk Conference Call and Web Meeting Information: Dial-In: 1-866-740-1260 Access Code: 6517175 Security

More information

DRAFT Risks and Mitigations for Losing EMS Functions

DRAFT Risks and Mitigations for Losing EMS Functions DRAFT Risks and Mitigations for Losing EMS Functions 1.0 Executive Summary Energy Management System (EMS) is a system of computer-aided tools used by System Operators to monitor, control, and optimize

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Chapter 14: Advanced Troubleshooting

Chapter 14: Advanced Troubleshooting Chapter 14: Advanced Troubleshooting IT Essentials v6.0 ITE v6.0 1 Chapter 14 - Sections & Objectives 14.0 Introduction Review Troubleshooting Steps 14.1 Computer Components and Peripherals Troubleshoot

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Avaya Aura TM System Platform R6.0.1 Service Pack Release Notes Issue 1.4

Avaya Aura TM System Platform R6.0.1 Service Pack Release Notes Issue 1.4 Avaya Aura TM Service Pack Release Notes Issue 1.4 INTRODUCTION This document introduces the Avaya Aura TM System Platform Release 6.0.1 Service Pack and describes known issues and the issues resolved

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include:

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include: AppSense DataNow Release Notes (Version 4.0) These release notes include: Components in this Release Important Upgrade Information New Features Bugs Fixed Known Issues and Limitations Supported Operating

More information

Avaya Aura TM System Platform R6.0 Release Notes Issue 2.0

Avaya Aura TM System Platform R6.0 Release Notes Issue 2.0 Avaya Aura TM Release Notes Issue 2.0 INTRODUCTION This document introduces the Avaya Aura TM System Platform Release 6.0 and describes known issues and the issues resolved in this release. Please Note:

More information

Brocade FOS Release v6.2.2f9 Internal Content Notes

Brocade FOS Release v6.2.2f9 Internal Content Notes Brocade FOS Release v6.2.2f9 Internal Content Notes The Brocade CCE process has been used to provide stable code fixes to various Brocade customer sites. The following sections document the defects and

More information

Cluster creation and maintenance

Cluster creation and maintenance Cluster creation and maintenance Cisco TelePresence Deployment Guide Cisco VCS X6.1 Cisco TMS 12.6 or later D14367.08 May 2011 Contents Contents Document revision history... 5 Introduction... 6 Prerequisites...

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

ForeScout CounterACT Resiliency Solutions

ForeScout CounterACT Resiliency Solutions ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency

More information

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable? Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011

More information

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018. Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada

More information

Cisco Expressway Cluster Creation and Maintenance

Cisco Expressway Cluster Creation and Maintenance Cisco Expressway Cluster Creation and Maintenance Deployment Guide Cisco Expressway X8.6 July 2015 Contents Introduction 4 Prerequisites 5 Upgrading an X8.n cluster to X8.6 6 Prerequisites 6 Upgrade Expressway

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

SCADA. SurvalentONE. STC Explorer

SCADA. SurvalentONE. STC Explorer SurvalentONE SCADA SurvalentONE SCADA Survalent SCADA is a software automation solution to provide real-time control and data acquisition for utility operations. Survalent SCADA software includes STC Explorer

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

Security. ITM Platform

Security. ITM Platform Security ITM Platform Contents Contents... 0 1. SaaS and On-Demand Environments... 1 1.1. ITM Platform configuration modes... 1 1.2. Server... 1 1.3. Application and Database... 2 1.4. Domain... 3 1.5.

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Agenda Event Analysis Subcommittee Conference Call

Agenda Event Analysis Subcommittee Conference Call Agenda Event Analysis Subcommittee Conference Call August 14, 2013 11:00 a.m. 1:00 p.m. Eastern Ready Talk Conference Call and Web Meeting Information: Dial-In: 1-866-740-1260 Access Code: 6517175 Security

More information

Synchronous switching of distribution sub networks

Synchronous switching of distribution sub networks Synchronous switching of distribution sub networks Paul Stergiou ConEdison USA Manuel P Pimenta, - ConEdison USA Sergio A Rodriguez ConEdison USA Thomas Horan ConEdison USA Andre Smit- Siemens Industry

More information

vrealize Operations Management Pack for NSX for vsphere 3.0

vrealize Operations Management Pack for NSX for vsphere 3.0 vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

EMS Managing Availability 24/7

EMS Managing Availability 24/7 EMS Managing Availability 24/7 Mathew Malm Real Time Systems - SCADA Team Lead Sept 19, 2013 1 BCH EMS Background Info Real Time Systems Group and EMS EMS Team ( Real-Time Systems) consists of about 25

More information

This is an inspection failure, not meeting the requirement of >10k Ohm between either PD battery post and chassis.

This is an inspection failure, not meeting the requirement of >10k Ohm between either PD battery post and chassis. Troubleshooting This is a document put together by CSA Laura Rhodes that contains a lot of information about troubleshooting steps for a lot of common control system problems encountered at events. No

More information

JEA Lessons Learned?

JEA Lessons Learned? JEA Lessons Learned? $ whoami Daniel D. Mishra JEA Director of CIP Compliance mishdd@jea.com Electric Utility Experience 20 years Critical Infrastructure Experience 10 Years Specialization Innovative and

More information

xponent Version 4.2 RELEASE NOTES

xponent Version 4.2 RELEASE NOTES xponent Version 4.2 RELEASE NOTES Copyright Luminex Corporation, 1996-2013. All rights reserved. Part Number: 89-30000-00-462 Disclaimer Subject to change without notice. Although prepared to ensure accuracy,

More information

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0 ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution

More information

Downtime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications

Downtime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications Downtime Prevention Buyer s Guide 6 QUESTIONS to help you choose the right availability protection for your applications Question 6 questions to help you choose the right availability protection for your

More information

1. Which network design consideration would be more important to a large corporation than to a small business?

1. Which network design consideration would be more important to a large corporation than to a small business? CCNA 1 Chapter 11 v5.0 Exam Answers 2015 (100%) 1. Which network design consideration would be more important to a large corporation than to a small business? Internet router firewall low port density

More information

Chapter 3 Managing System Settings

Chapter 3 Managing System Settings Chapter 3 Managing System Settings Using the System Settings Utility The navigation pane at the top of the web browser interface contains a System tab that enables you to manage your FS700TSSmart Switch

More information

Standard Req # Requirement D20MX Security Mechanisms D20ME II and Predecessors Security Mechanisms

Standard Req # Requirement D20MX Security Mechanisms D20ME II and Predecessors Security Mechanisms GE Digital Energy D20MX - NERC - CIP Response Product Bulletin Date: May 6th, 2013 Classification: GE Information NERC Critical Infrastructure Protection Response Overview The purpose of this document

More information

Evolution of Control for the Power Grid

Evolution of Control for the Power Grid Evolution of Control for the Power Grid Anjan Bose Washington State University Pullman, WA, USA PaiFest In Honor of Prof. M. A. Pai Urbana-Champaign, IL October 15, 2015 The Past (before 1960s) Hard

More information

B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N

B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N NERC Monitoring and Situational Awareness Conference Bonneville Power Administration Self-Monitoring:

More information

Security of Information Technology Resources IT-12

Security of Information Technology Resources IT-12 Security of Information Technology Resources About This Policy Effective Dates: 11-28-2007 Last Updated: 10-23-2017 Responsible University Administrator: Office of the Vice President for Information Technology

More information

MRD-310 MRD G Cellular Modem / Router Web configuration reference guide. Web configuration reference guide

MRD-310 MRD G Cellular Modem / Router Web configuration reference guide. Web configuration reference guide Web configuration reference guide 6623-3201 MRD-310 MRD-330 Westermo Teleindustri AB 2008 3G Cellular Modem / Router Web configuration reference guide www.westermo.com Table of Contents 1 Basic Configuration...

More information

DSS Professional FAQ. Ver:

DSS Professional FAQ. Ver: DSS Professional FAQ Ver: 7.00.000 Contents 1 Installation and Deployment... 1 1.1 What kind of OS can install DSS Professional?... 1 1.2 What kind of performance of server can install DSS Professional?...

More information

Office and Express Print Release High Availability Setup Guide

Office and Express Print Release High Availability Setup Guide Office and Express Print Release High Availability Setup Guide Version 1.0 2017 EQ-HA-DCE-20170512 Print Release High Availability Setup Guide Document Revision History Revision Date May 12, 2017 September

More information

Database Administration

Database Administration Unified CCE, page 1 Historical Data, page 2 Tool, page 3 Database Sizing Estimator Tool, page 11 Administration & Data Server with Historical Data Server Setup, page 14 Database Size Monitoring, page 15

More information

HP Supporting the HP ProLiant Storage Server Product Family.

HP Supporting the HP ProLiant Storage Server Product Family. HP HP0-698 Supporting the HP ProLiant Storage Server Product Family https://killexams.com/pass4sure/exam-detail/hp0-698 QUESTION: 1 What does Volume Shadow Copy provide?. A. backup to disks B. LUN duplication

More information

OL Connect Backup licenses

OL Connect Backup licenses OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers

More information

Troubleshooting the Network Analysis Module. Netflow Data Export. Web Application CHAPTER

Troubleshooting the Network Analysis Module. Netflow Data Export. Web Application CHAPTER CHAPTER 5 This chapter describes how to troubleshoot the NAM and includes these sections: Netflow Data Export, page 5-1 Error Messages, page 5-9 Web Username and Password Guidelines, page 5-15 Supported

More information

TANDBERG Management Suite - Redundancy Configuration and Overview

TANDBERG Management Suite - Redundancy Configuration and Overview Management Suite - Redundancy Configuration and Overview TMS Software version 11.7 TANDBERG D50396 Rev 2.1.1 This document is not to be reproduced in whole or in part without the permission in writing

More information

MONITORING AND CONTROL REQUIREMENTS FOR DISTRIBUTED GENERATION FACILITIES

MONITORING AND CONTROL REQUIREMENTS FOR DISTRIBUTED GENERATION FACILITIES MONITORING AND CONTROL REQUIREMENTS FOR DISTRIBUTED GENERATION FACILITIES 1. Introduction Real time monitoring and control is necessary to ensure public and employee safety and to protect the integrity

More information

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

Intrusion Detection and Prevention IDP 4.1r4 Release Notes Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2

More information

Cisco TelePresence VCS Cluster Creation and Maintenance

Cisco TelePresence VCS Cluster Creation and Maintenance Cisco TelePresence VCS Cluster Creation and Maintenance Deployment Guide Cisco VCS X8.5 Cisco TMS 13.2 or later December 2014 Contents Introduction 4 Prerequisites 5 Upgrading an X7.1 or later cluster

More information

Added SerialNumber object to ECESSA-MIB Description Device serial number is readable via ECESSA-MIB::SerialNumber.0.

Added SerialNumber object to ECESSA-MIB Description Device serial number is readable via ECESSA-MIB::SerialNumber.0. 10.6.4.1 Firmware Release Notes Release: 2016.03.08 Revision 1.0: 2016.03.08 Improvements System When the device sees that the available memory is getting low an e-mail alert will be sent The device will

More information

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3 Table of Contents 1 V & V4 Appliance Quick Start...1 1.1 Quick Start...1 1.2 Accessing Appliance Menus...1 1. Updating Appliance...1 1.4 Webmin...1 1.5 Setting Hostname IP Address...2 1.6 Starting and

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

User s Guide [Security Operations]

User s Guide [Security Operations] User s Guide [Security Operations] 006.1 Ver. 1.0 Contents Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST... 1-3

More information

Securing Plant Operation The Important Steps

Securing Plant Operation The Important Steps Stevens Point, WI Securing Plant Operation The Important Steps September 24, 2012 Slide 1 Purpose of this Presentation During this presentation, we will introduce the subject of securing your control system

More information

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication

More information

QEI. SCADA Remote Gateways & RTUs Substation & Feeder Automation Capacitor Control

QEI. SCADA Remote Gateways & RTUs Substation & Feeder Automation Capacitor Control QEI SCADA Remote Gateways & RTUs Substation & Feeder Automation Capacitor Control Industry Leadership QEI is a leading SCADA system and substation automation equipment supplier with a long history of innovation

More information

Automation Services and Solutions

Automation Services and Solutions Automation Services and Solutions Automate substation data acquisition and control to improve performance Maintain uninterrupted power services with proactive grid monitoring and controlling features.

More information

Moxa Remote Connect Server Software User s Manual

Moxa Remote Connect Server Software User s Manual User s Manual Edition 1.0, April 2018 www.moxa.com/product 2018 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

CompTIA Security+(2008 Edition) Exam

CompTIA Security+(2008 Edition) Exam http://www.51- pass.com Exam : SY0-201 Title : CompTIA Security+(2008 Edition) Exam Version : Demo 1 / 7 1.An administrator is explaining the conditions under which penetration testing is preferred over

More information

Troubleshooting. General Troubleshooting Information

Troubleshooting. General Troubleshooting Information General Information, page 1 Startup s, page 3 Phone Reset s, page 7 Phone Cannot Connect to LAN, page 9 Cisco IP Phone Security s, page 9 Video Call s, page 11 General Telephone Call s, page 12 Procedures,

More information

Upgrading the Server Software

Upgrading the Server Software APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining

More information

Submitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509)

Submitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509) Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group (CSSWG) Submitted on behalf of the DOE National SCADA Test

More information

Connectivity 101 for Remote Monitoring Systems

Connectivity 101 for Remote Monitoring Systems Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance

More information

Key Features... 2 Known Issues... 3 Resolved Issues... 5 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation...

Key Features... 2 Known Issues... 3 Resolved Issues... 5 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... SonicOS Notes Contents Key Features... 2 Known Issues... 3 Resolved Issues... 5 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 9 Platform Compatibility The SonicOS

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

Data Center Operations Guide

Data Center Operations Guide Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards

More information

User s Guide [Security Operations]

User s Guide [Security Operations] User s Guide [Security Operations] 007. 3 Ver. 1.04 Contents Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST...

More information

ZKLWHýSDSHU. 3UHð)DLOXUHý:DUUDQW\ý 0LQLPL]LQJý8QSODQQHGý'RZQWLPH. +3ý 1HW6HUYHUý 0DQDJHPHQW. Executive Summary. A Closer Look

ZKLWHýSDSHU. 3UHð)DLOXUHý:DUUDQW\ý 0LQLPL]LQJý8QSODQQHGý'RZQWLPH. +3ý 1HW6HUYHUý 0DQDJHPHQW. Executive Summary. A Closer Look 3UHð)DLOXUHý:DUUDQW\ý 0LQLPL]LQJý8QSODQQHGý'RZQWLPH ZKLWHýSDSHU Executive Summary The Hewlett-Packard Pre-Failure Warranty 1 helps you run your business with less downtime. It extends the advantage of

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

McAfee Gateway Appliance Patch 7.5.3

McAfee  Gateway Appliance Patch 7.5.3 Release Notes McAfee Email Gateway Appliance Patch 7.5.3 Contents About this release Resolved issues Installation - incremental package Installation - full images Known issues Find product documentation

More information

Troubleshooting. Testing Your Configuration CHAPTER

Troubleshooting. Testing Your Configuration CHAPTER 82 CHAPTER This chapter describes how to troubleshoot the ASA and includes the following sections: Testing Your Configuration, page 82-1 Reloading the ASA, page 82-8 Performing Password Recovery, page

More information

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 5.3.0.3 Original Publication: April 21, 2014 These release notes are valid for Version 5.3.0.3 of the Sourcefire 3D System. Even if you are familiar with the

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Managed NIDS Care Services

Managed NIDS Care Services Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,

More information

Dominion SX Release Notes

Dominion SX Release Notes Dominion SX Release Notes Dominion SX Release Notes and Compatibility Release 3.1.7 April 14, 2009 Document updated June 10, 2010 Contents Applicability... 2 Release Status... 2 Expiration Date of Content...

More information

07/ CONFIGURING SECURITY SETTINGS

07/ CONFIGURING SECURITY SETTINGS SECURITY LOG Malformed packet: Failed parsing a packed has been blocked because it is malformed. Maximum security enabled service a packet has been accepted because it belongs to a permitted service in

More information

12 Common Mistakes while Backing Up Databases

12 Common Mistakes while Backing Up Databases 12 Common Mistakes while Backing Up Databases This article was initially intended for Firebird DBMS developers and administrators, but contacts with administrators of other databases made it clear that

More information

AUTOMATION OF POWER DISTRIBUTION USING SCADA

AUTOMATION OF POWER DISTRIBUTION USING SCADA 1 2 ABSTRACT In every substation certain measurements, supervision, control, operation and protection functions are necessary. Traditionally these functions were performed manually by system operator from

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

Configuring High Availability (HA)

Configuring High Availability (HA) 4 CHAPTER This chapter covers the following topics: Adding High Availability Cisco NAC Appliance To Your Network, page 4-1 Installing a Clean Access Manager High Availability Pair, page 4-3 Installing

More information

Troubleshooting the Security Appliance

Troubleshooting the Security Appliance CHAPTER 43 This chapter describes how to troubleshoot the security appliance, and includes the following sections: Testing Your Configuration, page 43-1 Reloading the Security Appliance, page 43-6 Performing

More information

Introduction to Change and Configuration Management

Introduction to Change and Configuration Management CHAPTER 1 Introduction to Change and Configuration Management Cisco Prime Network Change and Configuration Management provides tools that allow you to manage the software and device configuration changes

More information

SCADA and Central Applications An introduction

SCADA and Central Applications An introduction SCADA and Central Applications An introduction Course map Outline of the lecture Power System Operation - Centralised Control Applications SCADA - SCADA architecture & Components - SCADA system functions

More information

Entergy Development and Deployment of IEC Protection and Control Including Process Bus

Entergy Development and Deployment of IEC Protection and Control Including Process Bus Entergy Development and Deployment of IEC 61850 Protection and Control Including Process Bus Chan Y. Wong Entergy Transmission Eric A. Udren and Solveig Ward Quanta Technology, LLC Presented at CIGRÉ Grid

More information

Unified Services Router Release Notes

Unified Services Router Release Notes : 1.09B32_WW Published Date: Mar 21, 2014 Copyright 2014 Copyright Notice This publication, including all photographs, illustrations and software, is protected under international copyright laws, with

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

Failover Clustering failover node cluster-aware virtual server one

Failover Clustering failover node cluster-aware virtual server one Failover Clustering Microsoft Cluster Service (MSCS) is available for installation on Windows 2000 Advanced Server, Windows 2000 Datacenter Server, and Windows NT Enterprise Edition with Service Pack 5

More information

Critical Cyber Asset Identification Security Management Controls

Critical Cyber Asset Identification Security Management Controls Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.

More information