• Concept of operation based on hierarchical access levels
  • Different access levels with priorities and restricted operation rights
  • Authentification by user name and password
  • Command and Control location centrally managed by SCADA servers