2. Ingression protection, according to IEC standard
IP 20
Ingression protection, according to IEC standard, level 20
ISO 9001
Set of standards for quality management.
IT
Information technology
LAN
Local area network
LED
Light-emitting diode
LHMI
Local Human Machine Interface, also Local HMI.
MicroSCADA
System for supervision, control and data acquisition
NCC
National Control Centre
ODBC
Open Database Connectivity is a standard for accessing
database management systems (DBMS).
PC
Personal Computer
PCI
Peripheral component interconnect, a local data bus
PCM600
Protection and control IED manager
PIN
Personal Identification Number
PST
Parameter setting tool within PCM600
RTU
Remote terminal unit
SA
Substation Automation
SCADA
Supervision, control and data acquisition, see also
MicroSCADA
SCT
System configuration tool according to standard IEC 61850
SHA
Secure Hash Algorithms. The SHA is one of a number of
cryptographic hash functions. A cryptographic hash is like a
signature for a text or a data file. SHA-256 algorithm generates
an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a
one way function – it cannot be decrypted back.
SMT
Signal matrix tool within PCM600
SNTP
Simple network time protocol – is used to synchronize
computer clocks on local area networks. This reduces the
requirement to have accurate hardware clocks in every
embedded system in a network. Each embedded node can
instead synchronize with a remote clock, providing the required
accuracy.
SPA
Strömberg protection acquisition, a serial master/slave protocol
for point-to-point communication
SSL/TLS
Transport Layer Security (TLS) and its predecessor, Secure
Sockets Layer (SSL), are cryptographic protocols that provide
communication security over the Internet. TLS and SSL
encrypt the segments of network connections at the Application
1MRK 511 454-UEN A
Section 9
Glossary
GMS600 1.3
53
Cyber security deployment guideline