tag:blogger.com,1999:blog-377981962024-03-13T20:32:51.354-07:00Webduke's LabMaik G. Seewald on Industrial IoT, Software Architecture, Distributed Computing and Computer SecurityMaik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.comBlogger150125tag:blogger.com,1999:blog-37798196.post-7936076033723601812019-03-30T13:08:00.003-07:002019-03-30T13:08:46.302-07:00To make it clear, any significant progress in computer science and commercial use is based on the vast increase in speed of (parallel) computing, memory capacity and communication capabilities as well as in the availability of those assets to a broad number of experts and individuals. This is true for the Internet, for robotics, gaming, IoT, and any other domain.Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-37263253100476128062019-02-25T10:16:00.002-08:002019-02-25T10:16:45.825-08:00<b>Secure and Trust in IoT and IIoT</b><br />
<br />
<a class="hashtag-link ember-view" data-control-name="update_hashtag" href="https://www.linkedin.com/feed/hashtag/?keywords=%23Security" id="ember2134" style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; font-weight: 600; line-height: inherit !important; margin: 0px; padding: 0px; text-decoration-line: none; touch-action: manipulation; vertical-align: baseline; white-space: pre-wrap;" target="_self"><span class="hashtag-a11y ember-view" dir="ltr" id="ember2135" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span aria-hidden="true" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">#</span><span class="hashtag-a11y__name" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Security</span></span></a><span style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;"> for </span><a class="hashtag-link ember-view" data-control-name="update_hashtag" href="https://www.linkedin.com/feed/hashtag/?keywords=%23IIoT" id="ember2138" style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; font-weight: 600; line-height: inherit !important; margin: 0px; padding: 0px; text-decoration-line: none; touch-action: manipulation; vertical-align: baseline; white-space: pre-wrap;" target="_self"><span class="hashtag-a11y ember-view" dir="ltr" id="ember2139" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="visually-hidden" style="background: 0px 0px; border: 0px; box-sizing: inherit; clip: rect(0px, 0px, 0px, 0px); display: block; height: 1px; line-height: inherit !important; margin: -1px; outline: 0px; overflow: hidden; padding: 0px; position: absolute; user-select: none; vertical-align: baseline; white-space: nowrap; width: 1px;">hashtag</span><span aria-hidden="true" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">#</span><span class="hashtag-a11y__name" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">IIoT</span></span></a><span style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;">: Network access control is essential for process networks in Industrial </span><a class="hashtag-link ember-view" data-control-name="update_hashtag" href="https://www.linkedin.com/feed/hashtag/?keywords=%23Automation" id="ember2142" style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; font-weight: 600; line-height: inherit !important; margin: 0px; padding: 0px; text-decoration-line: none; touch-action: manipulation; vertical-align: baseline; white-space: pre-wrap;" target="_self"><span class="hashtag-a11y ember-view" dir="ltr" id="ember2143" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="visually-hidden" style="background: 0px 0px; border: 0px; box-sizing: inherit; clip: rect(0px, 0px, 0px, 0px); display: block; height: 1px; line-height: inherit !important; margin: -1px; outline: 0px; overflow: hidden; padding: 0px; position: absolute; user-select: none; vertical-align: baseline; white-space: nowrap; width: 1px;">hashtag</span><span aria-hidden="true" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">#</span><span class="hashtag-a11y__name" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Automation</span></span></a><span style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;"> and Power Systems / </span><a class="hashtag-link ember-view" data-control-name="update_hashtag" href="https://www.linkedin.com/feed/hashtag/?keywords=%23Substation" id="ember2146" style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; font-weight: 600; line-height: inherit !important; margin: 0px; padding: 0px; text-decoration-line: none; touch-action: manipulation; vertical-align: baseline; white-space: pre-wrap;" target="_self"><span class="hashtag-a11y ember-view" dir="ltr" id="ember2147" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="visually-hidden" style="background: 0px 0px; border: 0px; box-sizing: inherit; clip: rect(0px, 0px, 0px, 0px); display: block; height: 1px; line-height: inherit !important; margin: -1px; outline: 0px; overflow: hidden; padding: 0px; position: absolute; user-select: none; vertical-align: baseline; white-space: nowrap; width: 1px;">hashtag</span><span aria-hidden="true" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">#</span><span class="hashtag-a11y__name" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Substation</span></span></a><span style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;"> Automation. We see more and more end-points attached to these networks - </span><a class="hashtag-link ember-view" data-control-name="update_hashtag" href="https://www.linkedin.com/feed/hashtag/?keywords=%23sensors" id="ember2150" style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; font-weight: 600; line-height: inherit !important; margin: 0px; padding: 0px; text-decoration-line: none; touch-action: manipulation; vertical-align: baseline; white-space: pre-wrap;" target="_self"><span class="hashtag-a11y ember-view" dir="ltr" id="ember2151" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="visually-hidden" style="background: 0px 0px; border: 0px; box-sizing: inherit; clip: rect(0px, 0px, 0px, 0px); display: block; height: 1px; line-height: inherit !important; margin: -1px; outline: 0px; overflow: hidden; padding: 0px; position: absolute; user-select: none; vertical-align: baseline; white-space: nowrap; width: 1px;">hashtag</span><span aria-hidden="true" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">#</span><span class="hashtag-a11y__name" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">sensors</span></span></a><span style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;">, </span><a class="hashtag-link ember-view" data-control-name="update_hashtag" href="https://www.linkedin.com/feed/hashtag/?keywords=%23actuators" id="ember2154" style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; font-weight: 600; line-height: inherit !important; margin: 0px; padding: 0px; text-decoration-line: none; touch-action: manipulation; vertical-align: baseline; white-space: pre-wrap;" target="_self"><span class="hashtag-a11y ember-view" dir="ltr" id="ember2155" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="visually-hidden" style="background: 0px 0px; border: 0px; box-sizing: inherit; clip: rect(0px, 0px, 0px, 0px); display: block; height: 1px; line-height: inherit !important; margin: -1px; outline: 0px; overflow: hidden; padding: 0px; position: absolute; user-select: none; vertical-align: baseline; white-space: nowrap; width: 1px;">hashtag</span><span aria-hidden="true" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">#</span><span class="hashtag-a11y__name" style="background: 0px 0px; border: 0px; box-sizing: inherit; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">actuators</span></span></a><span style="background: 0px 0px rgb(255, 255, 255); border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 14px; line-height: inherit !important; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;">, engineering devices in order to implement relevant use cases and enable new applications. BUT: We cannot trust a device unless we know what it does and how it works. Network access control based on policy-driven identification, authentication, and authorization mechanisms including context is a core requirement and precondition for robust network security in automation and control networks.</span>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-50814864289441113542018-05-13T11:41:00.003-07:002018-05-13T11:41:51.655-07:00<span style="background-position: 0px 0px; border: 0px; box-sizing: inherit; caret-color: rgba(0, 0, 0, 0.74902); color: rgba(0, 0, 0, 0.74902); font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Lucida Grande", Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;">Time-Sensitive Networking is the next big thing in automation and control networks, especially in the context of IEC 61850:</span><span style="background-position: 0px 0px; border: 0px; box-sizing: inherit; caret-color: rgba(0, 0, 0, 0.74902); color: rgba(0, 0, 0, 0.74902); font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Lucida Grande", Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;"> Deterministic Networking technologies based on the standards from IEEE 802.1TSN provide various means to support substation</span><span style="background-position: 0px 0px; border: 0px; box-sizing: inherit; caret-color: rgba(0, 0, 0, 0.74902); color: rgba(0, 0, 0, 0.74902); font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Lucida Grande", Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;"> automation networks based on IEC</span><span style="background-position: 0px 0px; border: 0px; box-sizing: inherit; caret-color: rgba(0, 0, 0, 0.74902); color: rgba(0, 0, 0, 0.74902); font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Lucida Grande", Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap;"> 61850. Higher efficiency in terms of resource usage is only one benefit. In many deployments, substation network bandwidth is overprovisioned in order to achieve the delay and packet loss requirements. Combined with the benefits of guaranteed bounded latency, low bounded jitter, and low packet loss, a substation automation solution built on top of an IEC 61850-TSN -Profile is a good fit to meet the tight requirements in an efficient way. As one result, the adoption and implementation of the Process Bus as a key architectural component of IEC 61850 would benefit. </span>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-8293462975413142202018-02-13T05:02:00.001-08:002018-05-13T11:55:22.110-07:00Is it really AI? (Update)We do read a lot about Artificial Intelligence (AI) these days. AI seems to get in nearly everything. Just pick the right chip and you can put the AI sticker on your product. But is it really that easy? Where is the difference between AI and Machine Learning? And, is the term Intelligence the correct notion anyhow to describe a computer based system? Is it a qualitative or quantitative property?<br />
Depending on the answer, is it something we can measure?<br />
<br />
Related to intelligence (IQ) as a characteristic (hopefully) of human beings: Would it be feasible to create a questionnaire for machines to found out about AI? A sort of IQ test for artificial intelligence?<br />
<br />
In essence, I don't see a generally accepted definition AI. One of the reasons for all the misconception.<br />
<br />Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-37028469418661332662018-02-13T04:59:00.000-08:002019-03-30T13:01:44.625-07:00Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-57971228933008726322018-02-08T06:06:00.002-08:002018-02-08T06:07:52.251-08:00Need to share a picture:<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvYebQZ7Y7agsCK0XxhJ6x0lXiL2dM5Cakg3UTgT-f1bo-1xx-7kuq3lC2xI9lnRP4hr7CEm3v2-J_x6kd8hazlpHjbtOH2aFwvehNQVklrK_wghMeFffR5JzItcYn9eliZCqBKw/s1600/DSC04104.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvYebQZ7Y7agsCK0XxhJ6x0lXiL2dM5Cakg3UTgT-f1bo-1xx-7kuq3lC2xI9lnRP4hr7CEm3v2-J_x6kd8hazlpHjbtOH2aFwvehNQVklrK_wghMeFffR5JzItcYn9eliZCqBKw/s400/DSC04104.JPG" width="400" /></a></div>
<div style="text-align: center;">
<div style="text-align: left;">
<span style="background-color: white; color: rgba(0 , 0 , 0 , 0.87); font-family: "arial" , , sans-serif;"><span style="font-size: x-small;"> </span></span><br />
<span style="background-color: white; color: rgba(0 , 0 , 0 , 0.87); font-family: "arial" , , sans-serif;"><span style="font-size: x-small;"> George Parks Highway, Alaska!</span></span></div>
</div>
Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-18990100322097778142018-01-28T10:23:00.001-08:002018-01-29T07:33:18.504-08:00IoT Security: Essential Requirements<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">One core requirement in IoT security is trust. Or, the other way around: We cannot trust an IoT device connected to the network unless we know exactly how it works. This is imperative! And it especially relevant with all the encrypted channels we see on the Internet. We might have MitM protection but we do not know what is on the wire and within the encrypted packages.</span>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-11279353353469505582018-01-26T04:58:00.001-08:002018-01-28T10:20:51.040-08:00Real technology needs<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">There are lot of trends and buzzwords, AI is only one of them. But there are also other needs. One of them is usability in cyber security. Security is important and a critical success criteria for IoT. Security controls and technologies exist. But for an average user it is hard to comprehend and difficult to handle. This has direct impact on the posture of devices attached to the Internet. We definitely need much better usability in security for IoT. This encompasses the entire life cycle: installation, on-boarding, operation, and maintenance.</span>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-91488567131981425732018-01-15T04:42:00.000-08:002018-01-28T10:19:21.867-08:00IoT Security - accept and handle failure<span style="background-color: white; color: rgba(0 , 0 , 0 , 0.7); font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">IoT as well as Industrial IoT (IIoT) present a couple of specific key requirements in order to build secure and reliable networks and systems operated in smart grid, smart city or manufacturing. Because of agility, size and the vast number of endpoints, automation and orchestration are important success criterions. But there is much more to consider: We need to accept and handle failure and security breaches. Survivability, resilience, isolation, and self-healing are essential characteristics and quality requirements for the underlying system architecture. Of course, network security is the sound basis for a scalable security architecture with strict network access control and secure onboarding as inherent features. This is the precondition for visibility and context awareness to address security intelligence in order to respond to threat automation and malware sophistication at all levels of the stack.</span>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-83893975107303729512018-01-02T05:34:00.004-08:002018-01-28T10:20:35.670-08:00<div class="MsoNormal">
<h2>
<b><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">IoT
Security - a primer</span></b></h2>
</div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">Security is a crucial requirement, a core building block, a
success criterion, and an enabler for IoT at the same time. With scalability
and extensibility, security represents an important quality attribute within
the overall IoT architecture. Linking a vast number of devices and
inter-connecting networks leads to complex systems that needs to be protected
comprehensively and holistically.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">Security impacts all layer of the IoT architecture. It starts
with the security of the endpoints and impacts the data and processes in the
cloud. Of course, the security of the network connecting all nodes is
imperative to the success. In this regard, IoT security comprises the security
of the network as well as the security of the connected devices, intermediate
subsystems, such as gateways, and systems consuming the data finally. Beside
connectivity and communication, security is important for all deployment and
management processes.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">First of all, there is no silver bullet, no unique approach to
implement IoT security comprehensively. Beside all the technical requirements,
there are always constraints and side effects such as cost pressure, time
schedules, available resources, expertise and so on. Nevertheless, there is a
set of essential requirements which must be considered from the beginning.<o:p></o:p></span></div>
<div class="MsoNormal">
<b><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;"><br /></span></b></div>
<div class="MsoNormal">
<b><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">Objectives
and Key Requirements<o:p></o:p></span></b><br />
<b><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;"><br /></span></b></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">The overall goal is to protect the entire system which
represents an IoT installation. The more granular security requirements, often
called security attributes, are confidentiality, availability, integrity, and
privacy. The relevance of these core attributes depends on the system, the
environment, the actuators and their functions. In an installation where
customer data is used, confidentiality and privacy are especially important. A
smart meter installation would be a perfect example. Data management,
processing, and distribution are becoming increasingly important for customers
who want to control and ensure their privacy. In several countries, this is
already regulated by law. Technologies and procedures to protect end user’s
privacy are evolving. Anonymization of user data is only one approach. More
advanced technologies follow an approach to conceal user identities and their
network activity from surveillance and traffic analysis by separating
identification and routing.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">In the industrial environment, availability and integrity are
high priority. Furthermore, safety cannot longer be separated from security. In
some scenarios, IoT systems might be part of the critical infrastructure which
even raises the bar for security. In these domains, security appliances and
functions must not hinder the performance of the critical applications.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt; line-height: 115%;">The following table contains the four key attributes:<o:p></o:p></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt; mso-yfti-tbllook: 1184;">
<tbody>
<tr>
<td style="border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 182.6pt;" valign="top" width="243"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Requirement
/ Attribute<o:p></o:p></span></div>
</td>
<td style="border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 298.5pt;" valign="top" width="398"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Objective<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 182.6pt;" valign="top" width="243"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Availability<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 298.5pt;" valign="top" width="398"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Ensures that
data is timely and reliable available to authorized entities when it is
needed <o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 182.6pt;" valign="top" width="243"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Integrity<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 298.5pt;" valign="top" width="398"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Protect data
from modification without authorization to ensure accuracy and completeness<o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 182.6pt;" valign="top" width="243"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Confidentiality<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 298.5pt;" valign="top" width="398"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Protect
disclosure and data access from unauthorized entities <o:p></o:p></span></div>
</td>
</tr>
<tr>
<td style="border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 182.6pt;" valign="top" width="243"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Information
and Data Privacy<o:p></o:p></span></div>
</td>
<td style="border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; width: 298.5pt;" valign="top" width="398"><div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">Management
of data according to legal regulations and public expectations<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: 12.0pt;">From an
individual perspective, privacy is the right to control what information may
be collected, processed and stored and by what entity, and to whom that
information may be disclosed.<o:p></o:p></span></div>
</td>
</tr>
</tbody></table>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal">
<span style="font-size: 12.0pt; line-height: 115%;"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The recommended approach to identify the essential requirements
is a risk-assessment of all assets that are part of the given IoT system.
Depending on the outcome which is impacted by financial, safety and other
consequences, requirement documentation can be compiled. In addition,
requirements derived from regulations, policies and standards will complete the
specification.</span><span style="font-family: "courier new";"><o:p></o:p></span></span></div>
Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-75956847475851864492017-12-30T05:21:00.000-08:002017-12-30T05:41:32.286-08:00Merry Christmas and a Happy New Year!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOkwDSXzGfGGDwCpq8Pn0VY1gBfDxVZ8ndbKAVnmxHl0SuoKQC-r85cFIBRAgX7M-N23KkwNVj3UgZhmdrk1RF4wlrwQp5Bs9weBxvAFiD2GoFrfoeHR3GFBfZ5PGWVlDOrEGfwg/s1600/striezel.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1200" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOkwDSXzGfGGDwCpq8Pn0VY1gBfDxVZ8ndbKAVnmxHl0SuoKQC-r85cFIBRAgX7M-N23KkwNVj3UgZhmdrk1RF4wlrwQp5Bs9weBxvAFiD2GoFrfoeHR3GFBfZ5PGWVlDOrEGfwg/s320/striezel.jpg" width="240" /></a></div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<b>MERRY CHRISTMAS!</b>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-8067499785503590332017-12-18T04:24:00.000-08:002019-03-30T13:01:45.551-07:00Is it really AI?<br />
<br />
We do read a lot about Artificial Intelligence (AI) these days. AI seems to get in nearly everything. Just pick the right chip and you can put the AI sticker on your product. But is it really that easy? Where is the difference between AI and Machine Learning? And, is the term Intelligence the correct notion anyhow to describe a computer based system? Is it a qualitative or quantitative property?<br />
Depending on the answer, is it something we can measure?<br />
<br />
Would it be feasible to create a questionnaire for machines to found out about AI?Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-14554152224957332832013-01-05T06:38:00.001-08:002013-01-05T06:38:24.740-08:00<b>Happy New Year! </b><br />
<b>Alles Gute für 2013, Gesundheit, Glück und Erfolg!</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEVNirr0E1Wr-0ZbAJ7R1l_pzYfJ9ZSeu9GBlcciUdVOyyNmkcJr-Xfb_ouY1AFayLf72xvErU5qYNuw8LMIKDSbyZi4uetrXOydOXpqKhaMDhtVf7YqlO1xIPKeA168JRjuDhqQ/s1600/happy2013.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEVNirr0E1Wr-0ZbAJ7R1l_pzYfJ9ZSeu9GBlcciUdVOyyNmkcJr-Xfb_ouY1AFayLf72xvErU5qYNuw8LMIKDSbyZi4uetrXOydOXpqKhaMDhtVf7YqlO1xIPKeA168JRjuDhqQ/s400/happy2013.jpg" width="267" /></a></div>
<br />Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com78tag:blogger.com,1999:blog-37798196.post-37614129549590499782011-01-27T00:02:00.001-08:002011-01-27T02:59:10.793-08:00Security Architecture – moving forward with an approach to outline a framework<span class="Apple-style-span" style="font-size: 13px; color: rgb(51, 51, 51); "><h3 class="post-title entry-title" style="margin-top: 0.25em; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 0px; font-size: 18px; font-weight: normal; line-height: 1.4em; color: rgb(204, 102, 0); "><span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 20px; font-size: 13px; ">It is a key success criteria in system development and architecture to improve and extend models, procedures and underlying frameworks. This is especially needed when it comes to cyber security of complex systems. I started recently to improve my framework for a robust security architecture. Many stakeholders tend to start with the details in such complex systems which may result in missing overall requirements and ramifications. Security in the scope of vast, distributed systems needs to be specified, designed, implemented and operated based on a solid framework – let’s call it a Security Architecture. I have seen many approaches in order to cover this tricky task. Many of them tend to be too complex. Unfortunately, complexity is not a driver for security (in contrast to simplicity). On the other hand, it’s a tough job to keep the Security Architecture for huge systems simple. Beside the need for a simple approach, transparency and clearness in the scope of Security Architecture are important attributes that should be addresses as key-objective. Security controls need to be structured and encapsulated in the relevant components of the Security Architecture in a clear and traceable manner. I prefer a structure consisting of the following main components:</span></h3><div class="post-body entry-content" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0.75em; margin-left: 0px; line-height: 1.6em; "><ol><li>Security Infrastructure [ Communication and Network Security, Perimeter Security, …]</li><li>System Security Services [ Access Control, Identity Management, Credential Management, Audit, Backup and Recovery, …]</li><li>Application Security [ Operation Systems, Databases, Web and Application Server, SaaS, Enterprise Applications, Collaboration, and Messaging, … ]</li><li>Service Security [ System Maintenance, System Operation, Change Management, Incident Management, Event Management and Forensics, Stakerholder & User Feedback, ...]</li><li>Security Management [ Policies and Roles, Risk Management, Training and Awareness, Secure Coding, Design Principles, Algorithms]<br /></li></ol>The components 1-4 are the basic layers of the Security Architecture. A more vertical component is Security Management which covers and affects all the other 4 essential parts of the Security Architecture.</div></span>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com12tag:blogger.com,1999:blog-37798196.post-81070939012972836852011-01-10T06:12:00.000-08:002019-03-30T13:01:45.752-07:00<p class="MsoNormal"><b></b></p><h1 align="left" style="text-align:left"><p:colorscheme colors="#ffffff,#000000,#000092,#000000,#ff0000,#ffffcc,#0000ff,#0000ff"><font class="Apple-style-span" size="3"><font class="Apple-style-span" face="verdana"> </font><div v:shape="_x0000_s1026" class="O"> <div><font class="Apple-style-span" face="verdana"><h1 align="left" style="text-align: left; "></h1><h1 align="left" style="text-align: left; "></h1><h2></h2><h1 align="left" style="text-align: left; "></h1><h1 align="left" style="text-align:left"><b><span style="font-size:12.0pt; mso-bidi-font-family:Arial">Fachtagung <span class="blsp-spelling-error" id="SPELLING_ERROR_0">Informationssicherheit</span> im Netz- und Anlagenbetrieb der elektrischen Energieversorgung</span></b><span style="font-size:12.0pt;mso-bidi-font-family:Arial"> <o:p></o:p></span></h1> <h1 align="left" style="text-align:left"><b><span lang="EN-US" style="font-size: 12.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><span class="blsp-spelling-error" id="SPELLING_ERROR_1">TC</span> 57 / WG 15 und <span class="blsp-spelling-error" id="SPELLING_ERROR_2">IEC</span> 62351<br /><span class="blsp-spelling-error" id="SPELLING_ERROR_3">Intro</span><o:p></o:p></span></b></h1> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Die <span class="blsp-spelling-error" id="SPELLING_ERROR_4">Working</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_5">Group</span> 15 (Data <span class="blsp-spelling-error" id="SPELLING_ERROR_6">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_7">Communication</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_8">Security</span>) ist im Rahmen des <span class="blsp-spelling-error" id="SPELLING_ERROR_9">IEC</span> innerhalb des <span class="blsp-spelling-error" id="SPELLING_ERROR_10">TC</span> 57 tätig.<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Das <span class="blsp-spelling-error" id="SPELLING_ERROR_11">TC</span> 57 [<span class="blsp-spelling-error" id="SPELLING_ERROR_12">Technical</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_13">Committee</span>] trägt den Titel “POWER SYSTEMS <span class="blsp-spelling-error" id="SPELLING_ERROR_14">management</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_15">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_16">associated</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_17">information</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_18">exchange</span>”.<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Das <span class="blsp-spelling-error" id="SPELLING_ERROR_19">TC</span> 57 entwickelt internationale Standards für Energie-<span class="blsp-spelling-error" id="SPELLING_ERROR_20">systeme</span> (<span class="blsp-spelling-error" id="SPELLING_ERROR_21">EMS</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_22">SCADA</span>, DA, <span class="blsp-spelling-error" id="SPELLING_ERROR_23">Teleprotection</span> und andere):<br /></span><a href="http://tc57.iec.ch/index-tc57.html"><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US">http://tc57.iec.ch/index-tc57.html</span></a><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"><o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Die WG 15 …<o:p></o:p></span></h2> <h3 style="margin-left:29.25pt;text-indent:-11.25pt"><span lang="EN-US" style="font-size:9.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US">… </span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US">hat ca. 55 Mitglieder und trifft sich zweimal im Jahr.<o:p></o:p></span></h3> <h3 style="margin-left:29.25pt;text-indent:-11.25pt"><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US">… ist für die Standards <span class="blsp-spelling-error" id="SPELLING_ERROR_24">IEC</span> 62351 (Part 1-8) federführend.<o:p></o:p></span></h3> <h3 style="margin-left:29.25pt;text-indent:-11.25pt"><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US">… ist für die <span class="blsp-spelling-error" id="SPELLING_ERROR_25">Security</span> von Protokollen innerhalb des <span class="blsp-spelling-error" id="SPELLING_ERROR_26">TC</span> 57 verantwortlich (z.B.: <span class="blsp-spelling-error" id="SPELLING_ERROR_27">IEC</span> 61850, <span class="blsp-spelling-error" id="SPELLING_ERROR_28">ICCP</span>/<span class="blsp-spelling-error" id="SPELLING_ERROR_29">TASE</span>.2).<o:p></o:p></span></h3> <h3 style="margin-left:29.25pt;text-indent:-11.25pt"><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US">… adressiert auch das Thema <span class="blsp-spelling-error" id="SPELLING_ERROR_30">End</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_31">to</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_32">End</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_33">Security</span>! <o:p></o:p></span></h3> <h1 align="left" style="text-align:left"><b><span lang="EN-US" style="font-size: 12.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><span class="blsp-spelling-error" id="SPELLING_ERROR_34">TC</span> 57 / WG 15 und <span class="blsp-spelling-error" id="SPELLING_ERROR_35">IEC</span> 62351<br /><span class="blsp-spelling-error" id="SPELLING_ERROR_36">IEC</span> 62351: Inhalt der Teile 1 bis 8 im Überblick<o:p></o:p></span></b></h1> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Part 1:</span></b><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> Einführung (Übersicht zum Thema <span class="blsp-spelling-error" id="SPELLING_ERROR_37">Cyber</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_38">Security</span>, Besonderheiten innerhalb der <span class="blsp-spelling-error" id="SPELLING_ERROR_39">TC</span> 57 Domäne)<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Part 2:</span></b><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> <span class="blsp-spelling-error" id="SPELLING_ERROR_40">Begrifflichkeiten</span> (<span class="blsp-spelling-error" id="SPELLING_ERROR_41">Glossary</span>, Ziel: besseres Verständnis basiert immer auf einheitlicher Terminologie)<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Part 3:</span></b><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> <span class="blsp-spelling-error" id="SPELLING_ERROR_42">Security</span> für Protokolle mit Profilen beruhend auf TCP/IP (z.B.: <span class="blsp-spelling-error" id="SPELLING_ERROR_43">ICCP</span>/<span class="blsp-spelling-error" id="SPELLING_ERROR_44">TASE</span>.2, </span><span style="font-size:10.0pt;mso-bidi-font-family:Arial"><span class="blsp-spelling-error" id="SPELLING_ERROR_45">IEC</span> 61850 Client/Server)</span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family: Arial;mso-ansi-language:EN-US"><o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Part 4:</span></b><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> <span class="blsp-spelling-error" id="SPELLING_ERROR_46">Security</span> für Protokolle mit Profilen beruhend auf <span class="blsp-spelling-error" id="SPELLING_ERROR_47">MMS</span> [</span><span style="font-size:10.0pt;mso-bidi-font-family:Arial"><span class="blsp-spelling-error" id="SPELLING_ERROR_48">Manufacturing</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_49">Messaging</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_50">Specification</span>] (z.B.: <span class="blsp-spelling-error" id="SPELLING_ERROR_51">ICCP</span>/<span class="blsp-spelling-error" id="SPELLING_ERROR_52">TASE</span>.2)<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span style="font-size:10.0pt;mso-bidi-font-family: Arial">Part 5:</span></b><span style="font-size:10.0pt;mso-bidi-font-family: Arial"> <span class="blsp-spelling-error" id="SPELLING_ERROR_53">Security</span> für Protokolle der Reihe </span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><span class="blsp-spelling-error" id="SPELLING_ERROR_54">IEC</span> 60870-5 u. Derivate<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Part 6:</span></b><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> <span class="blsp-spelling-error" id="SPELLING_ERROR_55">Security</span> für <span class="blsp-spelling-error" id="SPELLING_ERROR_56">IEC</span> 61850 (<span class="blsp-spelling-error" id="SPELLING_ERROR_57">GOOSE</span>, SV, <span class="blsp-spelling-error" id="SPELLING_ERROR_58">MMS</span>), <span class="blsp-spelling-error" id="SPELLING_ERROR_59">SNTP</span> (RFC 2030) und <span class="blsp-spelling-error" id="SPELLING_ERROR_60">VLAN</span> [<span class="blsp-spelling-error" id="SPELLING_ERROR_61">Virtual</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_62">Local</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_63">Area</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_64">Network</span>] Technologien<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Part 7:</span></b><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> <span class="blsp-spelling-error" id="SPELLING_ERROR_65">Security</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_66">MIB</span>’s [Management Information Base] für Netzwerk- und Systemmanagement (</span><span lang="EN-US" style="font-size:10.0pt;font-family: Wingdings;mso-ascii-font-family:Arial;mso-hansi-font-family:Arial;mso-ansi-language: EN-US;mso-char-type:symbol;mso-symbol-font-family:Wingdings"><span style="mso-char-type:symbol;mso-symbol-font-family:Wingdings">à</span></span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> <span class="blsp-spelling-error" id="SPELLING_ERROR_67">TC</span> 57 spezifische <span class="blsp-spelling-error" id="SPELLING_ERROR_68">MIBs</span>)<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><b><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Part 8:</span></b><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"> <span class="blsp-spelling-error" id="SPELLING_ERROR_69">RBAC</span> [<span class="blsp-spelling-error" id="SPELLING_ERROR_70">Role</span> Base Access <span class="blsp-spelling-error" id="SPELLING_ERROR_71">Control</span>] für Energiesysteme<br />(</span><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings; mso-ascii-font-family:Arial;mso-hansi-font-family:Arial;mso-ansi-language:EN-US; mso-char-type:symbol;mso-symbol-font-family:Wingdings"><span style="mso-char-type: symbol;mso-symbol-font-family:Wingdings">à</span></span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"> Rechte, Rollen, Access <span class="blsp-spelling-error" id="SPELLING_ERROR_72">Control</span>)<o:p></o:p></span></h2> <h1><span style="mso-bidi-font-family:Arial"><o:p> </o:p></span></h1> <h2><span lang="EN-US" style="mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h2><span lang="EN-GB" style="mso-bidi-font-family:Arial;mso-ansi-language:EN-GB"><o:p> </o:p></span></h2> <h2><b><span lang="EN-US" style="mso-bidi-font-family:Arial;mso-ansi-language: EN-US"><o:p> </o:p></span></b></h2> <h2><span lang="EN-US" style="mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h2><span lang="EN-US" style="mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h1 align="left" style="text-align:left"><b><span lang="EN-US" style="font-size: 12.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><span class="blsp-spelling-error" id="SPELLING_ERROR_73">TC</span> 57 / WG 15 und <span class="blsp-spelling-error" id="SPELLING_ERROR_74">IEC</span> 62351<br />WG 15: Kooperation, Interaktion, Wahrnehmung<o:p></o:p></span></b></h1> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Die Standards der Reihe <span class="blsp-spelling-error" id="SPELLING_ERROR_75">IEC</span> 62351 werden in Dokumenten und anderen Standards als relevant für die <span class="blsp-spelling-error" id="SPELLING_ERROR_76">Security</span> in der Energieversorgung und im Rahmen von Smart <span class="blsp-spelling-error" id="SPELLING_ERROR_77">Grids</span> erwähnt (Beispiele: <span class="blsp-spelling-error" id="SPELLING_ERROR_78">NIST</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_79">IEC</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_80">SG</span>3 <span class="blsp-spelling-error" id="SPELLING_ERROR_81">Roadmap</span>).<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span style="font-size:10.0pt;mso-bidi-font-family: Arial">Das <span class="blsp-spelling-error" id="SPELLING_ERROR_82">NIST</span> hat <span class="blsp-spelling-error" id="SPELLING_ERROR_83">IEC</span> 62351 kommentiert (Änderungen erforderlich).<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span style="font-size:10.0pt;mso-bidi-font-family: Arial">Das <span class="blsp-spelling-error" id="SPELLING_ERROR_84">NIST</span> hat <span class="blsp-spelling-error" id="SPELLING_ERROR_85">FERC</span> die <span class="blsp-spelling-error" id="SPELLING_ERROR_86">IEC</span> 62351 Standards als relevant für <span class="blsp-spelling-error" id="SPELLING_ERROR_87">Cyber</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_88">Security</span> empfohlen.</span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family: Arial;mso-ansi-language:EN-US"><o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Die Umsetzung in Produkten ist momentan eher überschaubar.<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Es gibt eine Vielzahl von Kooperationen und <span class="blsp-spelling-error" id="SPELLING_ERROR_89">Koordinationen</span> mit anderen Organisationen (z.B.: <span class="blsp-spelling-error" id="SPELLING_ERROR_90">IEEE</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_91">CIGRE</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_92">ISA</span>, ISO, …).<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Mitglieder der WG 15 arbeiten aktiv an Standards wie <span class="blsp-spelling-error" id="SPELLING_ERROR_93">NERC</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_94">CIP</span> und <span class="blsp-spelling-error" id="SPELLING_ERROR_95">NIST</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_96">IR</span> 7628 „<span class="blsp-spelling-error" id="SPELLING_ERROR_97">Guidelines</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_98">for</span> Smart <span class="blsp-spelling-error" id="SPELLING_ERROR_99">Grid</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_100">Cyber</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_101">Security</span>” mit.<o:p></o:p></span></h2> <h2><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h2><span lang="EN-US" style="font-size:12.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h1 align="left" style="text-align:left"><b><span lang="EN-US" style="font-size: 12.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><span class="blsp-spelling-error" id="SPELLING_ERROR_102">TC</span> 57 / WG 15 und <span class="blsp-spelling-error" id="SPELLING_ERROR_103">IEC</span> 62351<br />WG 15: Aktivitäten und Ausblick<o:p></o:p></span></b></h1> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Mehrere Teile des Standards werden momentan überarbeitet und angepasst. (</span><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-ascii-font-family:Arial; mso-hansi-font-family:Arial;mso-ansi-language:EN-US;mso-char-type:symbol; mso-symbol-font-family:Wingdings"><span style="mso-char-type:symbol;mso-symbol-font-family: Wingdings">à</span></span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family: Arial;mso-ansi-language:EN-US"> Machbarkeit, <span class="blsp-spelling-error" id="SPELLING_ERROR_104">Cipher</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_105">Suites</span>)<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Die WG-15 <span class="blsp-spelling-error" id="SPELLING_ERROR_106">spezifiziert</span> die <span class="blsp-spelling-error" id="SPELLING_ERROR_107">Security</span> für den Standard 61850-90-5 (“<span class="blsp-spelling-error" id="SPELLING_ERROR_108">Use</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_109">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_110">IEC</span> 61850 <span class="blsp-spelling-error" id="SPELLING_ERROR_111">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_112">transmit</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_113">synchrophasor</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_114">information</span>”) mit dem Ziel eines <span class="blsp-spelling-error" id="SPELLING_ERROR_115">Technical</span> Reports.<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Die WG-15 arbeitet weiterhin an einem <span class="blsp-spelling-error" id="SPELLING_ERROR_116">Technical</span> Report (“<span class="blsp-spelling-error" id="SPELLING_ERROR_117">Security</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_118">Architecture</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_119">Guidelines</span>”).<o:p></o:p></span></h2> <h2 style="mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list: Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Geplante Aktivitäten:<o:p></o:p></span></h2> <h3 style="margin-left:29.25pt;text-indent:-11.25pt;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family: Wingdings;mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list:Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Der Teil 9 “Schlüsselmanagement” ist momentan im Status eines NWIP [New Work Item Proposal].<o:p></o:p></span></h3> <h3 style="margin-left:29.25pt;text-indent:-11.25pt;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family: Wingdings;mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list:Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Unterstützung der WG-10 (</span><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-ascii-font-family: Arial;mso-hansi-font-family:Arial;mso-ansi-language:EN-US;mso-char-type:symbol; mso-symbol-font-family:Wingdings"><span style="mso-char-type:symbol;mso-symbol-font-family: Wingdings">à</span></span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family: Arial;mso-ansi-language:EN-US"> IED, IEC 61850) bei der Definition der “Security für System Management”.<o:p></o:p></span></h3> <h3 style="margin-left:29.25pt;text-indent:-11.25pt;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family: Wingdings;mso-bidi-font-family:Wingdings;mso-ansi-language:EN-US"><span style="mso-list:Ignore">§<span style="font:7.0pt "Times New Roman""> </span></span></span><!--[endif]--><span lang="EN-US" style="font-size:10.0pt; mso-bidi-font-family:Arial;mso-ansi-language:EN-US">Eventuell Unterstützung des NIST zum Thema “Security Requirements for Field-Deployed Devices” (</span><span lang="EN-US" style="font-size:10.0pt;font-family:Wingdings;mso-ascii-font-family: Arial;mso-hansi-font-family:Arial;mso-ansi-language:EN-US;mso-char-type:symbol; mso-symbol-font-family:Wingdings"><span style="mso-char-type:symbol;mso-symbol-font-family: Wingdings">à</span></span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family: Arial;mso-ansi-language:EN-US"> IED, Zähler)<o:p></o:p></span></h3> <h3 style="margin-left:29.25pt;text-indent:-11.25pt"><span lang="EN-US" style="font-size:9.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><o:p> </o:p></span></h3> <h1 align="left" style="text-align:left"><b><span lang="EN-US" style="font-size: 12.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US">TC 57 / WG 15 und IEC 62351<br />Finale<o:p></o:p></span></b></h1> <h2><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US">Vielen Dank für Ihre Aufmerksamkeit!<o:p></o:p></span></h2> <h2><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h2><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US">Dipl.-Ing. Maik G. Seewald <o:p></o:p></span></h2> <h2><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US">[maseewal@cisco.com]<o:p></o:p></span></h2> <h2><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h2><span style="font-size:10.0pt;mso-bidi-font-family:Arial"><span style="mso-tab-count:1"> </span>Frankfurt am Main, 20-Januar-2011<o:p></o:p></span></h2> <h2><span style="font-size:10.0pt;mso-bidi-font-family:Arial"><span style="mso-tab-count:1"> </span>Fachtagung Informationssicherheit im Netz- und Anlagenbetrieb der elektrischen Energieversorgung </span><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial;mso-ansi-language: EN-US"><o:p></o:p></span></h2> <h2><span lang="EN-US" style="font-size:10.0pt;mso-bidi-font-family:Arial; mso-ansi-language:EN-US"><o:p> </o:p></span></h2> <h3 style="margin-left:29.25pt;text-indent:-11.25pt"><span lang="EN-US" style="font-size:9.0pt;mso-bidi-font-family:Arial;mso-ansi-language:EN-US"><o:p> </o:p></span></h3></font></div></div></font></p:colorscheme></h1><span class="Apple-style-span" style="font-size: 27px; "><p:colorscheme colors="#ffffff,#000000,#000092,#000000,#ff0000,#ffffcc,#0000ff,#0000ff"><div v:shape="_x0000_s1026" class="O"><p:colorscheme colors="#ffffff,#000000,#000092,#000000,#ff0000,#ffffcc,#0000ff,#0000ff"><div v:shape="_x0000_s1026"> <div class="O1" style="mso-line-spacing:"80 20 0";mso-margin-left-alt:468"><!--[if ppt]--><span style="font-size:111%;visibility:hidden"><span style="mso-special-format:bullet; position:absolute;left:-3.72%;font-family:Wingdings">§</span></span><!--[endif]--><span lang="EN-US" style="mso-hansi-font-family:Arial;font-size:20pt"> </span></div> <div class="O" style="text-align:center;mso-line-spacing:"80 50 0";mso-margin-left-alt: 307"></div></div></p:colorscheme> <div style="text-align:center;mso-line-spacing:"100 50 0";mso-margin-left-alt: 307"></div></div></p:colorscheme></span><p></p>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-14604244155159258202010-12-22T00:25:00.000-08:002011-12-19T09:48:24.036-08:00Ein gesegnetes Weihnachtsfest!<br />
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYE4BmzH1PGwuV661S-Y1rDhwlbHdzOGUv5WgeAdLsN8S6R2RgDsJLdQy1c02hkvToHGrPSl1X6XoWTK2JKx2Ra_P-vFcipADUi1ga2uevXtoLZGsArKlMDrHJJQTkHIUDMoPjsw/s1600/glocke.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYE4BmzH1PGwuV661S-Y1rDhwlbHdzOGUv5WgeAdLsN8S6R2RgDsJLdQy1c02hkvToHGrPSl1X6XoWTK2JKx2Ra_P-vFcipADUi1ga2uevXtoLZGsArKlMDrHJJQTkHIUDMoPjsw/s320/glocke.JPG" width="233" /></a></div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
Merry Christmas and Good Times in 2011!</div>
<div>
<br /></div>
<div>
<br /></div>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com1tag:blogger.com,1999:blog-37798196.post-33145567906860119162010-12-14T09:23:00.001-08:002011-12-19T09:51:23.013-08:00Actually, it's winter time<br />
<a href="http://2.bp.blogspot.com/_Xe91NoL2djc/TQetGioSPqI/AAAAAAAAAL4/bRwY4oyOvS0/s1600/zwingerteich.JPG"><br /></a><br />
<div style="text-align: center;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCryCldXBl7szdAmCVAPRYjav3n7rzi0bFFEDfPANZ5rxDG5uMKjmyTtujSPPUUw8ziBTHr5ouAng14LBskU7G_nd7yv8Q1c8kqUgInblKV9XP_jvChm7xj767wxyvUjmj4fTa1w/s1600/zwingerteich.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="214" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCryCldXBl7szdAmCVAPRYjav3n7rzi0bFFEDfPANZ5rxDG5uMKjmyTtujSPPUUw8ziBTHr5ouAng14LBskU7G_nd7yv8Q1c8kqUgInblKV9XP_jvChm7xj767wxyvUjmj4fTa1w/s320/zwingerteich.JPG" width="320" /></a></div>
<br /></div>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com3tag:blogger.com,1999:blog-37798196.post-1622469953173552852010-10-19T11:04:00.000-07:002011-12-19T09:52:32.522-08:00It's autumn<br />
<div>
<span class="Apple-style-span"><u><br /></u></span></div>
<br />
<div>
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: center;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE1w-o-rMiBfnCc1tE7xHvMOFJU-wcm5FDV5Fk43bba4GZ3msxjZqJ9TbxQvj0dpYC_UQA54zo7fEBnWOhOM0ozC0qe2lWlrLNTkEHJGK4cMiDVbHIHB4gn1yS54RffEPksDNYcA/s1600/herbstdampfer.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="267" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE1w-o-rMiBfnCc1tE7xHvMOFJU-wcm5FDV5Fk43bba4GZ3msxjZqJ9TbxQvj0dpYC_UQA54zo7fEBnWOhOM0ozC0qe2lWlrLNTkEHJGK4cMiDVbHIHB4gn1yS54RffEPksDNYcA/s400/herbstdampfer.JPG" width="400" /></a></div>
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: left;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>
<div style="text-align: left;">
<span class="Apple-style-span" style="font-size: small;">River Elbe, October 2010 [webduke pics]</span></div>
<div style="text-align: left;">
<span class="Apple-style-span" style="font-size: small;"><br /></span></div>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com5tag:blogger.com,1999:blog-37798196.post-90614117577993288092010-10-15T01:47:00.000-07:002010-10-15T01:55:46.950-07:00Security must be based on a solid (security) architectureWe can read a lot about vulnerabilities, malicious code and horrifying threat scenarios these days. And, we can also learn from all these experts how to fight this. Actually, there is nothing about war and weapons (that could help anyhow). Everything is about solid requirement management (covering security from the very beginning), a decent architecture as well as a design which addresses security seriously. Sure, the team must be qualified to handle this. Just some thoughts: A sustainable architecture is composed of discrete elements, called components. Components are the core parts of architecture. Their design and composition is essential to meet the requirement for a sustainable architecture. Beside these factors, security is another success criterion. Components must be secured in accordance with industry recommended practices. Design and implementation must adhere to security principles, design patterns and coding rules. They must be configured according to the security policies of the organization. This must apply for all components the architecture consists of. Remember the weakest link paradigm; one weak component could compromise the security of the whole architecture. Components which expose interfaces to the “outside world”, like user or communication interfaces are especially under attack or even the entry point for an intruder. This must be considered when specifying, designing and developing these entities. And, interfaces must be well-defined to support an integrative approach in order to achieve end-to-end security. The idea behind this is that a system that is composed of components must assure security when sending or receiving message from on or more component to another and even beyond the system.Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com1tag:blogger.com,1999:blog-37798196.post-68853122201084083062010-07-28T04:47:00.000-07:002010-07-28T04:50:03.706-07:00Robustness and resilience of large distributed applications and networks<p class="MsoNormal">In the area of clouds and large distributed automation and control networks, we need to deal with a vast number of (growing) endpoints integrated in the (dynamic) system. It is probably a misconception to assume that all these peers could be protected comprehensively at any time. Hence, it must be an important objective that the protection of the entire system must not depend on the security status (pertaining integrity, confidentiality and availability) of each and every endpoint. In other words, a compromised node must not affect or infect the stability and protection of the entire distributed system. This shall be adressed in the system and security architecture and needs to be defined (and tested !) as a crucial requirement. A (layered) defense in depth, as a general design principle, can help to meet this requirement. In addition, intrusion detection, prevention and a quick isolation of the compromised node can help to minimize the overall impact. Plan for failure is the underlying principle to implement this efficiently. Beside these classical security precautions and controls, a robust design as well as adequate redandancy mechanisms for critical subsystems can support the system stability. </p>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com3tag:blogger.com,1999:blog-37798196.post-34158994490283007612010-06-22T04:27:00.000-07:002010-06-22T04:39:39.768-07:00Security in large distributed networks (aka Smart Grids)<span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:georgia;">Security is not only a crucial requirement for conventional data and communication networks. It must be also addressed in networks that are installed and operated to automate and manage energy grids in order to achive a Smart Grid. Definitions may vary but the need for security in the area of critical infrastructures is undisputed. Beyond architecture and compliance, real implementation requirements exist. The paper </span></span><span class="Apple-style-span" style="border-collapse: collapse; color: rgb(0, 51, 102); font-weight: bold; "><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="color:#000000;"><a href="http://www.computer.org/portal/web/csdl/doi/10.1109/ICIW.2010.28"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:georgia;">Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments</span></span></a><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:georgia;"> presented at th</span></span></span><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:georgia;">e</span></span></span><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:georgia;"> </span></span></span><span class="Apple-style-span" style="border-collapse: collapse; "><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:georgia;">2010 Fifth International Conference on Internet and Web Applications and Services in Barcelona provides insights.</span></span></span>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-17646218682870408932010-06-02T07:56:00.000-07:002010-06-02T08:00:32.618-07:00Test your security!Testing security of distributed systems is a very complex thing (sure, security is complex inherently). This is because of the nature of security requirements which is functional as well as non-functional. To meet such basket of requirements, good practise is highly recommended. The subsequent bullets list the necessary steps in a proposed order to achieve this goal:<br /><ul><li>Document all functional and non-functional requirements and develop use case scenarios base on it (a picture helps a lot !) </li><li>Invite security professionals for support and guidance</li><li>Conduct a comprehensive threat assessment based on a well documented system architecture and (preferable) a security architecture (invite all relevant stakeholders: product management, architects, developer, test folks, …)</li><li>The architecture must support flexible patch and update management</li><li>Review the resulting design, at least the security relevant components</li><li>Check on all 3rd party components in detail to identify known weaknesses; if so, look for alternatives</li><li>Provide and teach (!) secure coding and secure design principles to the team</li><li>Make sure that the team has enough time to learn and to apply such rules and principles (project management must plan accordingly!)</li><li>Test all functional security requirements accoring to your test specification (use well documented requirements and use case scenarios to specify test cases)</li><li>Use tools to check your code to identify flaws and derivations from your guidelines mentioned above</li><li>Apply code review if tools are not sufficient</li><li>Use a realistic test environment (set up) to run a kinda black box test based on tools (fuzzer, etc.)</li><li>Test especially all user interface (focus on web based interfaces) as well as communication stacks</li><li>Document all testing results and establish a rating based on criticality</li><li>Communicate and share your experience </li></ul>Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com2tag:blogger.com,1999:blog-37798196.post-86752395676657028272010-04-23T09:59:00.000-07:002010-04-23T10:01:37.257-07:00Divide and ProtectDivide and conquer is a well-know strategy in software design and architecture. In terms of OOA/OOD it is not really my favorite approach, but this is not the topic of this post.<br /><strong>Divide and protect </strong>is one option to secure large distributed systems. The concept of Divide and Protect is about the compartmentation of a system into functional blocks with identical requirements in terms of security and privacy. It supports a defense in depth strategy, and it helps to handle the complexity of large installations. The compartmentation of a given system leads to security zones with different levels of trust that should be outlined in a digram. Based on such diagram (red = not trusted, .., green = trusted), the system architecture can be developed in a comprehensive manner. This is especially true for the communication architecture and the selection of appropriate protocols. By using this approach, non-functional requirements can be addressed in the early beginning of the product development process which means no change (requests) later on.Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com0tag:blogger.com,1999:blog-37798196.post-45558178228438347812010-01-21T11:18:00.000-08:002010-01-21T11:21:49.073-08:00Failure is an optionI read about a conference on failing in the Silicon Valley last year (and I was fascinated by this way of thinking immideately). Well, I think this approach to tackle issues and mistakes is one success criterion which makes this exceptional high-tech valley that successful. Ten years ago, I was lucky to work for one year in Santa Clara / Sunnyvale. At this time, the Silicon Valley was the epicentre of the internet boom. I learned a lot about trying out new things and to be innovative in thinking and developing systems. I need to mention from time to time that software development is still a heuristic process. There are no tools to produce exactly that result in terms of code which is intended in the phase of project initialization. It (the mother of all tools) has been promised for years but it has not arrived yet. Sure, there are patterns, models, code fragments, IDE’s and many other helpful things but in the end it is up to a human beeing (the engineer) to compose and develop the solution. And this still works by trial and error in many cases. The most important lesson is to accept failure and to learn from it. This sounds easier than done and means a learning process for the whole team. But this is absolutely necessary in order to handle the complexity of computer science these days in a professional manner. One of my methods to take care of this is to document alternative solutions (to the choosen way of implementing it) for a given project and to outline the reasons for discarding. As an easy rule of thumb: In order to develop solutions successfully, we need to learn how to fail in the right ways.Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com19tag:blogger.com,1999:blog-37798196.post-90986621457263541472009-11-24T11:36:00.000-08:002009-11-24T11:39:11.811-08:00Success criterions for development projectsMany factors do impact the success of development projects these days, much more than a couple of years ago. I have learned to focus on a very limited number (3-4) of key objectives to achieve in large scale projects in order to stay on track. Key objectives are the principles of a project and should be well-know, understood and accepted within the project team. To miss even one of them means failure. If it comes to decision making, the key objectives build a good foundation to move forward. This is a proven approach for projects but also for the development process itself. Here are my four (4) key objectives for successful system development: <br /><ol><li>Precise, high quality requirements based on strong user involvement</li><li>A motivated and skilled team with the ability to learn constantly</li><li>Flexible and realistic project management </li><li>An open and innovative environment which understands the fact that software development is a heuristic process and which accepts failure<br /></li></ol>I don’t want to simplify system development. I do know that there are many other factors and ramifications. But people tend to get lost in too many details and micro-management tasks. Concentrating on the essentials does lead to successful development in a very complex world.Maik G. Seewaldhttp://www.blogger.com/profile/00045860258717674379noreply@blogger.com2