{"id":4939,"date":"2021-03-18T10:53:54","date_gmt":"2021-03-18T09:53:54","guid":{"rendered":"https:\/\/pq-as-a-service.com\/power-quality-standards-emc\/information-and-data-security\/"},"modified":"2023-10-10T06:36:45","modified_gmt":"2023-10-10T05:36:45","slug":"information-and-data-security","status":"publish","type":"page","link":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/","title":{"rendered":"Information and data security"},"content":{"rendered":"<div  class='av-hotspot-image-container av-kfgks11v-df07f1c947a25fc929fe8735506dae61  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  av-hotspot-numbered av-mobile-fallback-active  av-non-fullwidth-hotspot-image'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class='av-hotspot-container'><div class='av-hotspot-container-inner-cell'><div class='av-hotspot-container-inner-wrap'><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-4857 avia-img-lazy-loading-not-4857 avia_image' src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\" alt='Threat from cyber attacks' title='angry-error'  height=\"440\" width=\"1500\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?resize=300%2C88&amp;ssl=1 300w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?resize=1030%2C302&amp;ssl=1 1030w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?resize=768%2C225&amp;ssl=1 768w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?resize=705%2C207&amp;ssl=1 705w\" sizes=\"(max-width: 1500px) 100vw, 1500px\" \/><\/div><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4mgtx6-37d04e10c393e380a60a67386edcfaf4\">\n.flex_column.av-4mgtx6-37d04e10c393e380a60a67386edcfaf4{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-4mgtx6-37d04e10c393e380a60a67386edcfaf4 av_one_full  avia-builder-el-1  el_after_av_image_hotspot  el_before_av_hr  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kffjyby8-67c0c498167a4a78e86d3b6649cc7128 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>Data security for monitoring systems<\/h1>\n<p>This section discusses information on IT security in the context of power quality &amp; power monitoring systems.<\/p>\n<p style=\"text-align: left;\"><em>The chapter is dynamic and therefore not to be considered conclusive.<\/em><\/p>\n<\/div><\/section><\/div>\n<div  class='hr av-a29ay-8aed145510982d6e6233a3d78bd80146 hr-default  avia-builder-el-3  el_after_av_one_full  el_before_av_one_full '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kgtj8rgh-ea6f8510e130a536483cabc0931e3666\">\n@keyframes av_boxShadowEffect_av-kgtj8rgh-ea6f8510e130a536483cabc0931e3666-column {\n0%   { box-shadow:  0 0 0 0 #d1d1d1; opacity: 1; }\n100% { box-shadow:  0 0 10px 0 #d1d1d1; opacity: 1; }\n}\n.flex_column.av-kgtj8rgh-ea6f8510e130a536483cabc0931e3666{\nbox-shadow: 0 0 10px 0 #d1d1d1;\nborder-radius:0px 0px 0px 0px;\npadding:10px 10px 10px 10px;\n}\n<\/style>\n<div  class='flex_column av-kgtj8rgh-ea6f8510e130a536483cabc0931e3666 av_one_full  avia-builder-el-4  el_after_av_hr  el_before_av_one_full  first flex_column_div shadow-not-animated  '     ><div  class='avia-content-slider-element-container av-kgtj3hcn-779b47374e37739f32e2383f10f864c5 avia-content-slider-element-slider avia-content-slider avia-smallarrow-slider avia-content-slider-active avia-content-slider-even  avia-builder-el-5  avia-builder-el-no-sibling  av-slideshow-ui av-control-default av-nav-arrows-visible av-nav-dots-visible av-hide-nav-arrows av-slideshow-manual av-loop-once av-loop-manual-endless avia-content-slider1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:&quot;&quot;,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:30}\"><div class='avia-smallarrow-slider-heading '><div class='new-special-heading'><h3 class=''>Possible risks<\/h3><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-1' aria-describedby='av-svg-desc-1' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-1'>Previous<\/title>\n<desc id='av-svg-desc-1'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-2' aria-describedby='av-svg-desc-2' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-2'>Next<\/title>\n<desc id='av-svg-desc-2'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><div class='avia-slideshow-dots avia-slideshow-controls'><a href='#1' class='goto-slide active' >1<\/a><a href='#2' class='goto-slide ' >2<\/a><\/div><\/div><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><section class='slide-entry av-4yfhy7-dcc2fbf7c64987d2a57ed4c250dad607 flex_column av_one_half post-entry slide-entry-overview slide-loop-1 slide-parity-odd  first'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" >Data theft<\/h3><\/section><section class='slide-entry av-4d51cv-845d0d9936e0383e5ef30f8703cfffbb flex_column av_one_half post-entry slide-entry-overview slide-loop-2 slide-parity-even  '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><ul>\n<li>Hacking &amp; Cracking<\/li>\n<li>Listening<\/li>\n<li>Datamining<\/li>\n<li>Theft of passwords and other information<\/li>\n<li>&#8230;<\/li>\n<\/ul>\n<\/div><\/section><\/div><div class=\"slide-entry-wrap\"><section class='slide-entry av-3k50hb-98314e4972d16e983659346714a3b9ad flex_column av_one_half post-entry slide-entry-overview slide-loop-3 slide-parity-odd  first'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" >Data manipulation<\/h3><\/section><section class='slide-entry av-1yklzz-0632a1bf20f014118f575699f23750eb flex_column av_one_half post-entry slide-entry-overview slide-loop-4 slide-parity-even  post-entry-last  '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><ul>\n<li>Unauthorised access (intranet, terminals, server, &#8230;)<\/li>\n<li>Modification of data &amp; data telegrams<\/li>\n<li>Delete data<\/li>\n<li>Changing configurations<\/li>\n<li>&#8230;<\/li>\n<\/ul>\n<\/div><\/section><\/div><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-174b93c522dd9b9df96129f286eded6e\">\n.flex_column.av-6uyjy-174b93c522dd9b9df96129f286eded6e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-174b93c522dd9b9df96129f286eded6e av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_hr  first flex_column_div av-zero-column-padding  column-top-margin'     ><article  class='iconbox iconbox_left av-kfnnxxeh-e65dda0cce3d8fce906ac9d05a6524c8  avia-builder-el-7  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Conclusion\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue83f' data-av_iconfont='entypo-fontello'  ><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >Conclusion<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>Unintentional data interventions mean that something is no longer the way it was planned in principle. Therefore, such interventions often have a direct impact on costs as well as on the reputation of the person or company concerned. The damage is therefore x times higher than just the defence or healing of the intervention that has taken place.<\/p>\n<p>It should also be noted, that devices that have already been attacked can be used as a platform for the substantial spread of data tapping &amp; manipulation. This means that unintentional access has an x-fold greater risk potential than it might initially appear.<\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/serious-vulnerabilities-found-schneider-electric-power-meters\" target=\"_blank\" rel=\"noopener\">Practice examples click here<\/a><\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n<div  class='hr av-334l8q-f69fac6a663990b60d38776468f07e94 hr-default  avia-builder-el-8  el_after_av_one_full  el_before_av_three_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fb91m-ec7ad4620dce1b0cddf7e93d7ee06d50\">\n.flex_column.av-2fb91m-ec7ad4620dce1b0cddf7e93d7ee06d50{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2fb91m-ec7ad4620dce1b0cddf7e93d7ee06d50 av_three_fifth  avia-builder-el-9  el_after_av_hr  el_before_av_two_fifth  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km5y3cnt-3194e928a05944d8f4b429ca07b1c3f8\">\n.avia-image-container.av-km5y3cnt-3194e928a05944d8f4b429ca07b1c3f8 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-km5y3cnt-3194e928a05944d8f4b429ca07b1c3f8 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-km5y3cnt-3194e928a05944d8f4b429ca07b1c3f8 av-styling- av-hover-grow avia_animated_image av-animated-when-visible-95 fade-in avia-align-center  avia-builder-el-10  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-1051 avia-img-lazy-loading-not-1051 avia_image ' src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/12\/software_systems_solutions-1030x599-1.jpg?fit=1030%2C599&ssl=1\" alt='Die 7 Netzebenen' title='Die 7 Netzebenen'  height=\"599\" width=\"1030\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/12\/software_systems_solutions-1030x599-1.jpg?w=1030&amp;ssl=1 1030w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/12\/software_systems_solutions-1030x599-1.jpg?resize=300%2C174&amp;ssl=1 300w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/12\/software_systems_solutions-1030x599-1.jpg?resize=768%2C447&amp;ssl=1 768w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/12\/software_systems_solutions-1030x599-1.jpg?resize=705%2C410&amp;ssl=1 705w\" sizes=\"(max-width: 1030px) 100vw, 1030px\" \/><\/div><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-dckka-4f1caa1fe733559acb126a91d572cfe1\">\n.flex_column.av-dckka-4f1caa1fe733559acb126a91d572cfe1{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-dckka-4f1caa1fe733559acb126a91d572cfe1 av_two_fifth  avia-builder-el-11  el_after_av_three_fifth  el_before_av_one_full  flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-26468f-d720354bedeba6133316fd3726692983 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><strong>The main characteristics of the 7 network levels in the context of data flow<\/strong><\/h3>\n<ul>\n<li>Electrical interconnections must communicate with each other<\/li>\n<li>Integration into the World Wide Web (www)<\/li>\n<li>Integration of more measuring points<\/li>\n<li>Users on grid level 7 (local distribution grid &lt;1kV) become (app) specialists (e.g. SmartHome, energy procurement, &#8230;)<\/li>\n<li>SmartGrid applications are becoming popular and also demanded<\/li>\n<li>Planning with simulation and trends are becoming increasingly important for the networks<\/li>\n<li>Dynamic load management (e.g. redispatch, &#8230;)<\/li>\n<li>&#8230;<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-174b93c522dd9b9df96129f286eded6e\">\n.flex_column.av-6uyjy-174b93c522dd9b9df96129f286eded6e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-174b93c522dd9b9df96129f286eded6e av_one_full  avia-builder-el-13  el_after_av_two_fifth  el_before_av_hr  first flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_left av-kfnnxxeh-e65dda0cce3d8fce906ac9d05a6524c8  avia-builder-el-14  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Conclusion\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue83f' data-av_iconfont='entypo-fontello'  ><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >Conclusion<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>Data flows and volumes are increasing and are associated with extreme threats as well as obstacles (e.g. connectivity).<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n<div  class='hr av-7igefu-cc70a974984ce12c5dc03536d210f4a5 hr-default  avia-builder-el-15  el_after_av_one_full  el_before_av_one_half '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-67hxyi-1959fc7472dd6fa05b7cf2f63fda0fb3\">\n.flex_column.av-67hxyi-1959fc7472dd6fa05b7cf2f63fda0fb3{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-67hxyi-1959fc7472dd6fa05b7cf2f63fda0fb3 av_one_half  avia-builder-el-16  el_after_av_hr  el_before_av_one_half  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kffkwcg0-45e678fd542cdd5f7309f06620871414 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-4868 \" src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=131%2C139&#038;ssl=1\" alt=\"\" width=\"131\" height=\"139\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?w=800&amp;ssl=1 800w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=283%2C300&amp;ssl=1 283w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=768%2C814&amp;ssl=1 768w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=665%2C705&amp;ssl=1 665w\" sizes=\"auto, (max-width: 131px) 100vw, 131px\" \/>What data and manipulation security strategies are used?<\/strong><\/h3>\n<ul>\n<li>Definition of a company-specific IT(C) policy<\/li>\n<li>Employment of internal as well as external IT specialists in the respective areas of expertise<\/li>\n<li>Operate closed or isolated networks<\/li>\n<li>Strict compliance with country-specific data protection guidelines and laws<\/li>\n<li>Reduce proprietary systems (e.g. proprietary manufacturer interfaces)<\/li>\n<li>Use of standardized protocols (e.g. IEC 61850, PQDIF IEEE 1159.3, etc.)<\/li>\n<li>Use of additional software solutions for monitoring<\/li>\n<li>Centralisation of systems (hardware, software, personnel)<\/li>\n<li>Outsourcing of services to external companies<\/li>\n<li>Insourcing of outsourcing services<\/li>\n<li>Segmentierung des Netzes, um m\u00f6gliche Attacken-Oberfl\u00e4che zu minimieren<\/li>\n<li>&#8230;..<\/li>\n<li>&#8230;..<\/li>\n<li>Use of auditable security standards (e.g. ISO 27001, individual, etc.)<\/li>\n<\/ul>\n<p><em>All points are not conclusive!<br \/>\n<\/em><\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-33f081e8f769740a93a73299eb2400f2\">\n.flex_column.av-6uyjy-33f081e8f769740a93a73299eb2400f2{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-33f081e8f769740a93a73299eb2400f2 av_one_half  avia-builder-el-18  el_after_av_one_half  el_before_av_hr  flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-2w5o8f-ea27c4b88289f3366fe90ce8183c0c61 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-978 alignleft\" src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/iec.gif?resize=58%2C58&#038;ssl=1\" alt=\"\" width=\"58\" height=\"58\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/iec.gif?w=58&amp;ssl=1 58w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/iec.gif?resize=36%2C36&amp;ssl=1 36w\" sizes=\"auto, (max-width: 58px) 100vw, 58px\" \/>Insight into ISO 27001 &#8211; a workable approach?<\/strong><\/h3>\n<p>This International Standard has been developed to specify requirements for the establishment, implementation, maintenance and continuous improvement of an Information Security Management System (ISMS).<\/p>\n<p>The introduction of an information security management system is a strategic decision for an organisation. The creation and implementation of such a system within an organisation depends on its needs and goals, the security requirements, the organisational processes and the size and structure of the organisation. It can be assumed that all these influencing variables will change over time.<\/p>\n<p>The information security management system maintains the confidentiality, integrity and availability of information using a risk management process and provides confidence to interested parties that risks are appropriately managed.<\/p>\n<p>It is important that the information security management system is integrated into the organisation&#8217;s overall governance structure as part of its operations and that information security is already taken into account in the design of processes, information systems and measures.<\/p>\n<p>It is expected that the implementation of a security system (ISMS) will be scaled according to the needs of the organisation.<\/p>\n<p>This standard is supplemented by IEC62443. This in turn describes a holistic approach to cyber security. And this down to the component level within industrial automation.<\/p>\n<\/div><\/section><\/div><div  class='hr av-7igefu-cc70a974984ce12c5dc03536d210f4a5 hr-default  avia-builder-el-20  el_after_av_one_half  el_before_av_one_third '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-174b93c522dd9b9df96129f286eded6e\">\n.flex_column.av-6uyjy-174b93c522dd9b9df96129f286eded6e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-174b93c522dd9b9df96129f286eded6e av_one_third  avia-builder-el-21  el_after_av_hr  el_before_av_two_third  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km682psy-9783c1f0af4fb68dc037e8dc05433c23\">\n.avia-image-container.av-km682psy-9783c1f0af4fb68dc037e8dc05433c23 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-km682psy-9783c1f0af4fb68dc037e8dc05433c23 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-km682psy-9783c1f0af4fb68dc037e8dc05433c23 av-styling- avia-align-center  avia-builder-el-22  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-4645 avia-img-lazy-loading-not-4645 avia_image ' src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?fit=2560%2C1215&ssl=1\" alt='Risks cyber attacks' title='pq-angry-basel'  height=\"1215\" width=\"2560\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?w=2560&amp;ssl=1 2560w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?resize=300%2C142&amp;ssl=1 300w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?resize=1030%2C489&amp;ssl=1 1030w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?resize=768%2C365&amp;ssl=1 768w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?resize=1536%2C729&amp;ssl=1 1536w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?resize=2048%2C972&amp;ssl=1 2048w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?resize=1500%2C712&amp;ssl=1 1500w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel-scaled.jpg?resize=705%2C335&amp;ssl=1 705w\" sizes=\"(max-width: 1500px) 100vw, 1500px\" \/><\/div><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-33f081e8f769740a93a73299eb2400f2\">\n.flex_column.av-6uyjy-33f081e8f769740a93a73299eb2400f2{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-33f081e8f769740a93a73299eb2400f2 av_two_third  avia-builder-el-23  el_after_av_one_third  el_before_av_hr  flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_left av-kfnnxxeh-77c0f5cdf2b5dbfd070904cbf2a9c827  avia-builder-el-24  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: The problem\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue83f' data-av_iconfont='entypo-fontello'  ><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >The problem<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><div id=\"tw-target-text-container\" class=\"tw-ta-container hide-focus-ring tw-nfl\" tabindex=\"0\">\n<ul>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Individual approaches only take up partial aspects<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">IT experts mostly have a technical focus and less on the overall context<\/li>\n<li id=\"tw-target-text\" class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><span lang=\"de\">ISO 27001 is a complete, holistic management system and very complex<\/span><\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">IEC62443 is in principle only applicable to the sub-area of industrial automation<\/li>\n<li class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><span lang=\"de\">There is still no IT security standard according to IEC for power quality instruments as well as power monitoring devices at device level. This is currently being processed in the committees of the IEC TC85\/WG 20 &#8211; Equipment for measuring and monitoring of steady state and dynamic quantities in Power Distribution Systems unter dem Projekttitel: \u201cCybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis&#8221;.<br \/>\n<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><div  class='hr av-7igefu-cc70a974984ce12c5dc03536d210f4a5 hr-default  avia-builder-el-25  el_after_av_two_third  el_before_av_three_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-174b93c522dd9b9df96129f286eded6e\">\n.flex_column.av-6uyjy-174b93c522dd9b9df96129f286eded6e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-174b93c522dd9b9df96129f286eded6e av_three_fifth  avia-builder-el-26  el_after_av_hr  el_before_av_two_fifth  first flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_left av-kfnnxxeh-8958b58c05166ee70bffd42358bbfb0d  avia-builder-el-27  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: A possible answer for monitoring applications\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue864' data-av_iconfont='entypo-fontello'  ><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >A possible answer for monitoring applications<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><div id=\"tw-target-text-container\" class=\"tw-ta-container hide-focus-ring tw-nfl\" tabindex=\"0\">\n<p>Consideration from individual aspects of ISO 27001 as well as from GSTQ901, Network Quality Instrument &#8211; Cybersecurity Requirements of the company ENEL<\/p>\n<ul>\n<li class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Assign role-based access rights (RBAC)<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Use transport encrypted websites (https)<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Client whitelist for limiting access to end devices<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Audit log for seamless monitoring of changes and operations<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">SysLog to secure the operations (tracking)<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Apply certified firmware updates to measuring instruments and software<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Decentralised data loggers as redundancy outside the IT system<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Use secure connections in mobile applications<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Uninterruptible power supply (centralised\/decentralised)<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Use metrologically certified measuring instruments<\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-33f081e8f769740a93a73299eb2400f2\">\n.flex_column.av-6uyjy-33f081e8f769740a93a73299eb2400f2{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-33f081e8f769740a93a73299eb2400f2 av_two_fifth  avia-builder-el-28  el_after_av_three_fifth  el_before_av_hr  flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-km69de0j-6f4343e14d946665eda6397a7bf6d2b5\">\n.avia-image-container.av-km69de0j-6f4343e14d946665eda6397a7bf6d2b5 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-km69de0j-6f4343e14d946665eda6397a7bf6d2b5 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-km69de0j-6f4343e14d946665eda6397a7bf6d2b5 av-styling- av-img-linked avia-align-right  avia-builder-el-29  el_before_av_hr  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/pq-as-a-service.com\/en\/data-and-manipulation-security\/\" class='avia_image '  target=\"_blank\"  rel=\"noopener noreferrer\" aria-label='happy'><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-4790 avia-img-lazy-loading-not-4790 avia_image ' src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/happy.jpg?fit=745%2C340&ssl=1\" alt='' title='happy'  height=\"340\" width=\"745\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/happy.jpg?w=745&amp;ssl=1 745w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/happy.jpg?resize=300%2C137&amp;ssl=1 300w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/happy.jpg?resize=705%2C322&amp;ssl=1 705w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/a><\/div><\/div><\/div><br \/>\n<div  class='hr av-7igefu-cc70a974984ce12c5dc03536d210f4a5 hr-default  avia-builder-el-30  el_after_av_image  el_before_av_icon_box '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<article  class='iconbox iconbox_left av-km69v0xe-572cdd0faf855fa2192d01889a66ceaf  avia-builder-el-31  el_after_av_hr  avia-builder-el-last '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Solutions\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue81e' data-av_iconfont='entypo-fontello' title=\"Solutions\" desc=\"Solutions\" ><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" ><a href='https:\/\/pq-as-a-service.com\/en\/data-and-manipulation-security\/' title='Solutions'  target=\"_blank\"  rel=\"noopener noreferrer\" >Solutions<\/a><\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/p><\/div><\/p>\n<div  class='hr av-7igefu-cc70a974984ce12c5dc03536d210f4a5 hr-default  avia-builder-el-32  el_after_av_two_fifth  el_before_av_one_full '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6uyjy-174b93c522dd9b9df96129f286eded6e\">\n.flex_column.av-6uyjy-174b93c522dd9b9df96129f286eded6e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6uyjy-174b93c522dd9b9df96129f286eded6e av_one_full  avia-builder-el-33  el_after_av_hr  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_left av-kfnnxxeh-e65dda0cce3d8fce906ac9d05a6524c8  avia-builder-el-34  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Conclusion\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue83f' data-av_iconfont='entypo-fontello'  ><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >Conclusion<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><ul>\n<li>If Cyber Security hardened components are not used, much more effort has to be invested in Cyber Security Manegement Systems. This is dangerous because insecure components cannot really be managed in a secure way either.<\/li>\n<li>Conformance testing of a product\u2019s Cyber Security costs a minimum of the outlay for a security management system certificate<\/li>\n<li>Often, device manufacturers leave the costs for security management to the customers instead of developing secure products themselves<\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":4857,"parent":4048,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4939","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information and data security - Power Quality Wissen<\/title>\n<meta name=\"description\" content=\"Data flows and volumes are increasing and are associated with extreme threats as well as obstacles (e.g. connectivity).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information and data security - Power Quality Wissen\" \/>\n<meta property=\"og:description\" content=\"Data flows and volumes are increasing and are associated with extreme threats as well as obstacles (e.g. connectivity).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Power Quality Wissen\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-10T05:36:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/\",\"url\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/\",\"name\":\"Information and data security - Power Quality Wissen\",\"isPartOf\":{\"@id\":\"https:\/\/pq-as-a-service.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\",\"datePublished\":\"2021-03-18T09:53:54+00:00\",\"dateModified\":\"2023-10-10T05:36:45+00:00\",\"description\":\"Data flows and volumes are increasing and are associated with extreme threats as well as obstacles (e.g. connectivity).\",\"breadcrumb\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\",\"width\":1500,\"height\":440,\"caption\":\"Threat from cyber attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/pq-as-a-service.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Power quality standards (EMC)\",\"item\":\"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information and data security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pq-as-a-service.com\/#website\",\"url\":\"https:\/\/pq-as-a-service.com\/\",\"name\":\"Power Quality as a Service\",\"description\":\"Powered by CAMILLE BAUER METRAWATT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pq-as-a-service.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information and data security - Power Quality Wissen","description":"Data flows and volumes are increasing and are associated with extreme threats as well as obstacles (e.g. connectivity).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Information and data security - Power Quality Wissen","og_description":"Data flows and volumes are increasing and are associated with extreme threats as well as obstacles (e.g. connectivity).","og_url":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/","og_site_name":"Power Quality Wissen","article_modified_time":"2023-10-10T05:36:45+00:00","og_image":[{"width":1500,"height":440,"url":"https:\/\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/","url":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/","name":"Information and data security - Power Quality Wissen","isPartOf":{"@id":"https:\/\/pq-as-a-service.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#primaryimage"},"image":{"@id":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","datePublished":"2021-03-18T09:53:54+00:00","dateModified":"2023-10-10T05:36:45+00:00","description":"Data flows and volumes are increasing and are associated with extreme threats as well as obstacles (e.g. connectivity).","breadcrumb":{"@id":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#primaryimage","url":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","contentUrl":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","width":1500,"height":440,"caption":"Threat from cyber attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/information-and-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/pq-as-a-service.com\/en\/"},{"@type":"ListItem","position":2,"name":"Power quality standards (EMC)","item":"https:\/\/pq-as-a-service.com\/en\/power-quality-standards-emc\/"},{"@type":"ListItem","position":3,"name":"Information and data security"}]},{"@type":"WebSite","@id":"https:\/\/pq-as-a-service.com\/#website","url":"https:\/\/pq-as-a-service.com\/","name":"Power Quality as a Service","description":"Powered by CAMILLE BAUER METRAWATT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pq-as-a-service.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/pages\/4939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/comments?post=4939"}],"version-history":[{"count":52,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/pages\/4939\/revisions"}],"predecessor-version":[{"id":7828,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/pages\/4939\/revisions\/7828"}],"up":[{"embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/pages\/4048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/media\/4857"}],"wp:attachment":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/media?parent=4939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}