1、 IEC/TS 62351-7Edition 1.0 2010-07TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 7:Network and system management(NSM)data object models IEC/TS 62351-7:2010(E)colourinsideCopyrighted material licensed to BR Demo by Thomson Re
2、uters(Scientific),Inc.,downloaded on Nov-28-2014 by James Madison.No further reproduction or distribution is permitted.Uncontrolled when printed.THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2010 IEC,Geneva,Switzerland All rights reserved.Unless otherwise specified,no part of this publication ma
3、y be reproduced or utilized in any form or by any means,electronic or mechanical,including photocopying and microfilm,without permission in writing from either IEC or IECs member National Committee in the country of the requester.If you have any questions about IEC copyright or have an enquiry about
4、 obtaining additional rights to this publication,please contact the address below or your local IEC member National Committee for further information.Droits de reproduction rservs.Sauf indication contraire,aucune partie de cette publication ne peut tre reproduite ni utilise sous quelque forme que ce
5、 soit et par aucun procd,lectronique ou mcanique,y compris la photocopie et les microfilms,sans laccord crit de la CEI ou du Comit national de la CEI du pays du demandeur.Si vous avez des questions sur le copyright de la CEI ou si vous dsirez obtenir des droits supplmentaires sur cette publication,u
6、tilisez les coordonnes ci-aprs ou contactez le Comit national de la CEI de votre pays de rsidence.IEC Central Office 3,rue de Varemb CH-1211 Geneva 20 Switzerland Email:inmailiec.ch Web:www.iec.ch About IEC publications The technical content of IEC publications is kept under constant review by the I
7、EC.Please make sure that you have the latest edition,a corrigenda or an amendment might have been published.?Catalogue of IEC publications:www.iec.ch/searchpub The IEC on-line Catalogue enables you to search by a variety of criteria(reference number,text,technical committee,).It also gives informati
8、on on projects,withdrawn and replaced publications.?IEC Just Published:www.iec.ch/online_news/justpub Stay up to date on all new IEC publications.Just Published details twice a month all new publications released.Available on-line and also by email.?Electropedia:www.electropedia.org The worlds leadi
9、ng online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions in English and French,with equivalent terms in additional languages.Also known as the International Electrotechnical Vocabulary online.?Customer Service Centre:www.iec.ch/webstore/custserv If yo
10、u wish to give us your feedback on this publication or need further assistance,please visit the Customer Service Centre FAQ or contact us:Email:csciec.ch Tel.:+41 22 919 02 11 Fax:+41 22 919 03 00 Copyrighted material licensed to BR Demo by Thomson Reuters(Scientific),Inc.,downloaded on Nov-28-2014
11、by James Madison.No further reproduction or distribution is permitted.Uncontrolled when printed.IEC/TS 62351-7Edition 1.0 2010-07TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 7:Network and system management(NSM)data object
12、models INTERNATIONAL ELECTROTECHNICAL COMMISSION WICS 33.200 PRICE CODEISBN 978-2-88912-050-5 Registered trademark of the International Electrotechnical Commission colourinsideCopyrighted material licensed to BR Demo by Thomson Reuters(Scientific),Inc.,downloaded on Nov-28-2014 by James Madison.No f
13、urther reproduction or distribution is permitted.Uncontrolled when printed.2 TS 62351-7 IEC:2010(E)CONTENTS FOREWORD.4 1 Scope.6 2 Normative references.6 3 Terms and definitions.6 4 Glossary of terms and definitions.6 5 Background of network and system management(NSM)requirements(informative).6 5.1
14、Objectives of IEC NSM standards.6 5.1.1 Scope of end-to-end security.6 5.1.2 End-to-end security measures.7 5.1.3 Security purposes.8 5.1.4 Role of network and system management(NSM)in end-to-end security.8 5.1.5 Scope of the NSM standard.10 5.2 Current lack of coherent information infrastructure.10
15、 5.3 Intrusion detection systems(IDS).12 5.3.1 ISO/IEC 18043 IDS guidelines.12 5.3.2 Intrusion detection system(IDS)concepts.13 5.3.3 IDS:Passive observation techniques.14 5.3.4 IDS:Active security monitoring architecture with NSM data objects.15 5.4 Network and system management(NSM)concepts.15 5.4
16、.1 IETF and ISO network management standards.15 5.4.2 ISO NSM categories.16 5.4.3 Simple network management protocol(SNMP).16 5.4.4 Management information bases(MIBs).16 5.4.5 NSM“data objects”for power system operations.17 6 Security and reliability NSM requirements for power system operations(informative).17 6.1 NSM requirements:Monitoring and controlling the networks and protocols.17 6.1.1 Network configuration monitoring and control.17 6.1.2 Network backup monitoring.18 6.1.3 Network comm