EN 60255-27 Electromagnetic compatibility (EMC) - Product standard for
measuring relays and protection equipment.
ESD Electrostatic discharge
FTP File Transfer Protocol (FTP) is a standard network protocol
used to transfer files from one host or to another host over a
TCP-based network, such as the Internet.
FTPS FTPS (also known as FTP-ES, FTP-SSL and FTP Secure) is an
extension to the commonly used File Transfer Protocol (FTP)
that adds support for the Transport Layer Security (TLS) and
the Secure Sockets Layer (SSL) cryptographic protocols.
GDE
Graphical display editor within PCM600
GOOSE Generic object-oriented substation event
GPS Global positioning system
GSM GPS time synchronization module
HMI Human-machine interface
HTTPS Hyper Text Transfer Protocol Secure. HTTPS is the secure
version of HTTP, the protocol over which data is sent between
your browser and the website that you are connected to. The 'S'
at the end of HTTPS stands for 'Secure'. It means all
communications between your browser and the website are
encrypted.
ID
IDentification
IEC International Electrical Committee
IEC 60255 This standard specifies the general performance requirements
of all electrical measuring relays and protection equipment
used in the electrotechnical fields covered by the IEC.
IEC 60870-5-103 Communication standard for protective equipment. A serial
master/slave protocol for point-to-point communication
IEC 61850 Substation automation communication standard
IEC 61850–8–1 Communication protocol standard
IED Intelligent electronic device
IEDUM IED User Management
IEEE Institute of Electrical and Electronics Engineers
IEEE1686 Standard for Substation Intelligent Electronic Devices (IEDs')
Cyber Security Capabilities
IP 1. Internet protocol. The network layer for the TCP/IP protocol
suite widely used on Ethernet networks. IP is a connectionless,
best-effort packet-switching protocol. It provides packet
routing, fragmentation and reassembly through the data link
layer.
Section 9 1MRK 511 454-UEN A
Glossary
52 GMS600 1.3
Cyber security deployment guideline