Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GBZ25320.7-2015 English PDF

US$714.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GBZ25320.7-2015: Power systems management and associated information exchange -- Data and communications security -- Part 7: Network and system management (NSM) data object models
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/Z 25320.7-2015714 Add to Cart 4 days Power systems management and associated information exchange -- Data and communications security -- Part 7: Network and system management (NSM) data object models Valid

Similar standards

GB/T 40427   GB/T 40588   GB/T 33593   GB/T 25320.4   GB/T 25320.6   GB/T 25320.11   

Basic data

Standard ID: GB/Z 25320.7-2015 (GB/Z25320.7-2015)
Description (Translated English): Power systems management and associated information exchange -- Data and communications security -- Part 7: Network and system management (NSM) data object models
Sector / Industry: National Standard
Classification of Chinese Standard: F21
Classification of International Standard: 29.240.01
Word Count Estimation: 36,353
Date of Issue: 2015-05-15
Date of Implementation: 2015-12-01
Quoted Standard: GB/Z 25320.2-2013
Adopted Standard: IEC/TS 62351-7-2010, IDT
Regulation (derived from): National Standard Announcement 2015 No. 15
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
Summary: This Standard specifies the communication networks, intelligent electronic device (IED, Intelligent Electronic Device), and custom communications protocol.

GBZ25320.7-2015: Power systems management and associated information exchange -- Data and communications security -- Part 7: Network and system management (NSM) data object models


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Power systems management and associated information exchange. Data and communications security. Part 7. Network and system management (NSM) data object models ICS 29.240.01 F21 People's Republic of China national standardization of technical guidance documents Power System Management and Information Exchange Data and Communication Security Part 7. Network and System Management (NSM) data object model Powersystems management and associated information exchange- Part 7.Networkandsystemmanagement (NSM) dataobjectmodels (IEC /T S62351-7.2010, IDT) 2015-05-15 released 2015-12-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1

4 abbreviation

5 Background of Network and System Management (NSM) Requirements (Informative) 1 5.1 The purpose of the IEC NSM standard 1 5.2 There is a lack of information infrastructure that is tightly integrated with each other 5.3 Intrusion Detection System (IDS) 6 5.4 Network and System Management (NSM) Concepts 9 6 NSM Requirements for Safety and Reliability of Power Systems (Informative) 10 6.1 NSM Requirements. Network and Protocol Monitoring and Control 10 6.2 NSM Requirements. End System Monitoring and Management 12 6.3 NSM Requirements. Intrusion Detection Function 13 7 NSM abstract data type 15 7.1 Abbreviations 15 7.2 Composition of NSM data objects 17 7.3 High-level NSM data type structure 18 8 NSM Abstract Data Objects 22 8.1 Communication Status NSM Data Objects 22 8.2 End System Status NSM Data Objects 25 8.3 Intrusion Detection NSM Data Objects 26 References 30

Foreword

GB /Z 25320 "power system management and information exchange data and communication security" mainly includes the following sections. --- Part 1. Introduction to communication network and system security and safety issues; --- Part 2. Terms; --- Part 3. Communication network and system security including TCP/IP protocol set; --- Part 4. Protocol set containing MMS; --- Part 5. GB/T 18657, etc. and their derivatives standards of security; --- Part 6. IEC 61850 safety; --- Part 7. Network and Systems Management (NSM) data object model; --- Part 8. Role-based access control. This section is Part 7 of GB /Z 25320. This section drafted according to GB/T 1.1-2009 given rules. This section uses the translation method identical with IEC /T S62351-7.2010 "Power System Management and its information exchange data and communications security Full Part 7. Data Object Model for Network and System Management (NSM). " This guideline is for reference only. For advice or comments on this guidance document, be directed to the Director of Standardization Administration of the State Council Department reflected. This part is proposed by China Electricity Council. This part of the National Power System Management and Information Exchange Standardization Technical Committee (SAC/TC82) centralized. This section is drafted by China Electric Power Research Institute, State Grid Electric Power Research Institute, the State Power Dispatching and Communication Center, East China Power Grid has Co., Ltd., Beijing Kedong Power Control System Co., Ltd., Huazhong Power Grid Co., Ltd., Fujian Provincial Electric Power Co., Ltd., Liaoning Electric Power Co., Ltd. Limited, China Southern Power Grid, China Huaneng Group, Northwest Power Grid Co., Ltd. The main drafters of this section. Jiang Chengzhi, Nan Guilin, Zhang Tao, Xu Mu Liang, Li Genwei, Ma Xiao, Han Shui Bao, Deng Zhaoyun, Cao Lianjun, Zhou Peng, Zeng Ronghan, Wang Qing let.

Introduction

Computer, communications and networking technologies are currently widely used in power systems. There are various kinds of information in communications and computer networks Possible security attacks pose a threat to the security of data and communications in power systems. These potential possible attacks target the power system Security vulnerabilities in communication protocols at various levels of the system and imperfections in the security management of power system information infrastructure. To this end, we adopted the international standard to develop GB /Z 25320 "Power System Management and its information exchange data and communication security", pass Over the relevant communication protocols and in the information infrastructure management to add specific security measures to enhance and enhance the power system data and Communication security. Power System Management and Information Exchange Data and Communication Security Part 7. Network and System Management (NSM) data object model

1 Scope

Power system operations are increasingly dependent on information infrastructures, including communications networks, intelligent electronic devices (IEDs, InteligentElec- tronicDevice), as well as custom communication protocols. Therefore, in order to provide the necessary high safety and reliability in the operation of power systems The management of the information infrastructure has become crucial. Using IETF for Network Management "Simple Network Management Protocol" (SNMP, SimpleNetworkManagementProtocol) standard proposed in the concept, this section defines the power system operation Unique Network and System Management (NSM) data object model. These NSM data Objects will be used to monitor the health of networks and systems, discover possible security intrusion, and the performance of information infrastructure Rely on the management. The NSM data object uses the naming convention for IEC 61850 and extends to address NSM issues. These data objects and The data types it contains are defined as abstract models of data objects. The actual format of the data object's bits and bytes will depend on these pulls The mapping of NSM data objects to specific protocols such as IEC 61850, IEC 60870-5, IEC 60870-6, IEC 61968/61970 (CIM Public Information Model), web services, SNMP or any other suitable protocol. Those maps are standard in several separate documents The The standardization of those maps will be written separately.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB /Z 25320.2-2013 Power system management and its exchange of information data and communications security Part 2 Terms (IEC /TS 62351-2.2008, IDT)

3 Terms and definitions

The terms and definitions defined in GB /Z 25320.2-2013 apply to this document.

4 Abbreviations

The abbreviations defined in GB /Z 25320.2-2013 apply to this document. 5 Background of Network and System Management (NSM) Requirements (Informative) 5.1 IEC NSM standard purposes 5.1.1 end-to-end security range End-to-end security includes not only deliberate attacks, but also unintentional behavior. This statement is crucial to understand the scope of this section.
......
Image