Section 9 Glossary
GUID-2282AE1E-7E51-4F9F-8066-70614FB38695 v4
AES Advanced Encryption Standard (AES) is a specification for
the encryption of electronic data. The key size used for an
AES cipher specifies the number of repetitions of
transformation rounds that convert the input, called the
plaintext, into the final output, called the ciphertext. The
number of cycles of repetition are as follows: 10 cycles of
repetition for 128-bit keys. 12 cycles of repetition for 192-bit
keys. 14 cycles of repetition for 256-bit keys.
AGSAL Generic security application
ANSI American National Standards Institute
ASCII American Standard Code for Information Interchange
(ASCII) is a character
-encoding scheme originally based on
the English alphabet. ASCII codes represent text in
computers, communications equipment, and other devices that
use text.
CA In cryptography
, certificate authority, or certification
authority, (CA) is an entity that issues digital certificates. The
digital certificate certifies the ownership of a public key by
the named subject of the certificate
CAM Central Account Management. User
, roles and rights are
handled in a Central Account Management server.
CMT Communication Management tool in PCM600
CPU Central processor unit
CRC Cyclic redundancy check
DARP
A Defense Advanced Research Projects Agency (The US
developer of the TCP/IP protocol etc.)
DHCP Dynamic Host Configuration Protocol
DNP3 DNP3 (Distributed Network Protocol) is a set of
communications protocols used between components in
process automation systems. Its main use is in utilities such as
electric and water companies. It plays a crucial role in
SCADA systems, where it is used by SCADA Master Stations
(aka Control Centers), Remote T
erminal Units (R
TUs), and
Intelligent Electronic Devices (IEDs). It is primarily used for
communications between a master station and RTUs or IEDs'.
DOS Denial of service
EMC Electromagnetic compatibility
1MRK 511 399-UEN B Section 9
Glossary
670 series 2.2 IEC 101
Cyber security deployment guideline