12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer Networks and Security<strong>the</strong>y also lead to <strong>in</strong>formation <strong>the</strong>ft or corruption. Network <strong>in</strong>formationcan reside on a hard drive or be <strong>in</strong> transit across <strong>the</strong> network cable <strong>in</strong> <strong>the</strong>form of packets. Serious hackers are also called crackers. They maybecome active <strong>in</strong> access<strong>in</strong>g your network and should be considered athreat. Some of <strong>the</strong>ir methods create holes with<strong>in</strong> <strong>the</strong> operat<strong>in</strong>g system,which allows easy access for hackers.Security TechnologyLevels of security should be implemented for Internet implementations.These will restrict <strong>the</strong> levels of access made available to remoteusers. This type of security is available from NT, Internet InformationServer (IIS) security, SSL (Secure Socket Layers), Digital Certificates andencryption.In Wonderware software <strong>the</strong>re are three types of protected dataaccess via <strong>the</strong> Internet. These are:• Read-only access of SQL clients, which are ActiveX objects,• Read-only access of real-time process graphics us<strong>in</strong>g standard NTand IIS security,• Runtime, a module which gives remote users <strong>the</strong> ability to respondto emergencies, security for <strong>the</strong> user is predef<strong>in</strong>ed us<strong>in</strong>g NT andIIS security adm<strong>in</strong>istration.In W<strong>in</strong>dows NT-based systems, general security is supportedthrough <strong>the</strong> OS and IIS (Figure 7-4). W<strong>in</strong>dows NT allows <strong>the</strong> user toenable and disable access to files and directories by user or group. WithIIS manager more security restrict<strong>in</strong>g read/write accesses can be added.Security technology <strong>in</strong>cludes SSL, Digital certificates and HTTPS.SSL is a protocol developed by Netscape that allows a secure transactionbetween standard browsers and Web servers on <strong>the</strong> Internet. Both <strong>the</strong>Netscape Navigator and Internet Explorer browsers support SSL.Encryption is ano<strong>the</strong>r type of security. Data can be encrypted us<strong>in</strong>ga secret key for encryption (symmetric) or public key encryption (asymmetric).In secret key encryption both parties share <strong>the</strong> same passwordor key. In public key encryption, <strong>the</strong>re are two keys that are related, oneis private and <strong>the</strong> o<strong>the</strong>r public. SSL uses <strong>the</strong> public key method of encryption.©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!