Cyber Dependencies Sample Clauses

Cyber Dependencies. Figure 19: Network of cyber dependencies, where each link represents a dependency of an entity on a particular telecommunication base station. The network is composed of 37 links. The entities within Esperantia are connected to each other by a network that constitutes the cyber dependency network. We show in the above figure the network that summarises such interac- tions.We provide in the next table the details of the network. For each link, we detail the two endpoints (from and to). Table 19: Links in the cyber dependency network. ID From To CD1 SS1 UA10 CD2 SS4 UA7 CD3 XX0 XX00 XX0 XX0 XX0 XX0 XX0 XX0 CD6 XX0 XX00 XX0 XX0 XX00 XX0 XX0 XX0 CD9 XX0 XX00 XX00 XX0 XX00 XX00 XX0 XX0 XX00 XX0 XX0 CD13 BS1 UA28 CD14 BS2 UA29 CD15 BS3 UA4 CD16 BS3 SS2 CD17 BS5 UA16 CD18 BS5 UA30 CD19 BS7 UA24 CD20 BS7 UA27 CD21 BS8 UA9 XX00 XX0 XX00 CD23 BS8 UA26 CD24 BS8 SS7 CD25 BS12 UA11 CD26 BS12 UA12 CD27 BS13 UA13 CD28 BS15 UA5 CD29 BS16 UA19 CD30 BS17 SS1 CD31 BS18 UA15 CD32 BS18 SS6 CD33 BS22 UA3 CD34 BS23 UA14 CD35 BS25 SS5 CD36 BS26 UA2 XX00 XX00 XX00
AutoNDA by SimpleDocs
Cyber Dependencies. We show next the degradation profile obtained when an element that has a cyber influence on an urban area is completely faulted or destroyed due to a cyber attack. Table 26: Degradation profiles for the urban areas with respect to cyber dependencies. ID Time thalf for 50% operativeness (hours) Slope k Final operative level σ A,B,min UA1 21,28 0,32 0,41 UA2 21,28 0,31 0,35 UA3 21,49 0,31 0,34 UA4 21,00 0,32 0,40 UA5 19,41 0,32 0,40 UA6 20,16 0,31 0,41 UA7 20,02 0,35 0,38 UA8 19,40 0,22 0,38 UA9 21,34 0,38 0,41 UA10 19,56 0,27 0,37 UA11 20,93 0,26 0,40 UA12 19,12 0,30 0,39 UA13 19,80 0,23 0,32 UA14 19,71 0,20 0,38 UA15 19,62 0,28 0,37 UA16 20,68 0,35 0,41 UA17 20,08 0,37 0,38 UA18 18,71 0,26 0,49 UA19 19,95 0,40 0,40 UA20 18,38 0,27 0,42 UA21 19,39 0,30 0,42 UA22 22,06 0,37 0,42 UA23 20,09 0,24 0,36 UA24 22,41 0,36 0,38 UA25 19,98 0,33 0,42 UA26 19,19 0,30 0,40 UA27 19,28 0,32 0,35 UA28 20,14 0,25 0,41 UA29 18,55 0,25 0,43 UA30 19,47 0,27 0,44
Cyber Dependencies. We show next the degradation profile obtained when an element that has a cyber influence on a substation is completely faulted or destroyed due to a cyber attack. Table 29: Degradation profiles for the primary substations with respect to cyber dependencies. ID Time thalf for 50% operativeness (hours) Slope k Final operative level σ A,B,min SS1 6,75 3,36 0,17 SS2 8,57 2,38 0,24 SS3 7,26 2,20 0,19 SS4 6,46 2,02 0,15 SS5 9,02 1,26 0,13 SS6 6,76 0,720 0,16 2.2.4.3 Telecommunication Base Stations
Cyber Dependencies. We show next the degradation profile obtained when an element that has a cyber influence on a base station is completely faulted or destroyed due to a cyber attack. Table 32: Degradation profiles for the base stations with respect to cyber dependencies. ID Time thalf for 50% operativeness (hours) Slope k Final operative level σ A,B,min BS1 15,33 3,14 0,71 BS2 15,06 3,34 0,28 BS3 14,63 1,04 0,01 BS4 17,31 2,21 0,01 BS6 15,39 3,41 0,24 BS7 16,11 2,93 0,43 BS11 16,04 3,53 0,28 BS12 15,27 2,52 0,09 BS14 15,66 0,70 0,23 BS15 16,29 3,56 0,52 BS16 17,49 1,77 0,26 BS17 15,87 0,82 1,04 BS21 15,11 1,71 0,94 BS22 16,05 1,34 1,06 BS24 16,31 2,43 0,66 BS25 16,13 3,11 0,61

Related to Cyber Dependencies

  • Dependencies HP’s ability to deliver services will depend on Customer’s reasonable and timely cooperation and the accuracy and completeness of any information from Customer needed to deliver the services.

  • Number Portability Each Party shall ensure that suppliers of public telecommunications networks or services in its territory provide number portability, to the extent technically and economically feasible, in a reasonable period of time and on terms and conditions that are reasonable and non-discriminatory.

  • Safety, breakdowns and accidents 17.5.1 The Concessionaire shall ensure safe conditions for the Users and passengers, and in the event of unsafe conditions, it shall follow the relevant operating procedures and undertake removal of obstruction and debris without delay. Such procedures shall conform to the provisions of this Agreement, Applicable Laws, Applicable Permits and Good Industry Practice.

  • DISASTER RECOVERY AND BUSINESS CONTINUITY The Parties shall comply with the provisions of Schedule 5 (Disaster Recovery and Business Continuity).

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where InterGlobe has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to InterGlobe. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for InterGlobe (e.g. hairpinning):

  • CLEC OUTAGE For a problem limited to one CLEC (or a building with multiple CLECs), BellSouth has several options available for restoring service quickly. For those CLECs that have agreements with other CLECs, BellSouth can immediately start directing traffic to a provisional CLEC for completion. This alternative is dependent upon BellSouth having concurrence from the affected CLECs. Whether or not the affected CLECs have requested a traffic transfer to another CLEC will not impact BellSouth's resolve to re-establish traffic to the original destination as quickly as possible.

  • Elements Unsatisfactory Needs Improvement Proficient Exemplary IV-A-1. Reflective Practice Demonstrates limited reflection on practice and/or use of insights gained to improve practice. May reflect on the effectiveness of lessons/ units and interactions with students but not with colleagues and/or rarely uses insights to improve practice. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues, and uses insights gained to improve practice and student learning. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues; and uses and shares with colleagues, insights gained to improve practice and student learning. Is able to model this element.

  • Collocation Transfer of Responsibility Without Working Circuits The Collocation is not serving any End User Customers and does not have active service terminations (e.g., Interconnection trunks or UNE Loops) or 2) Collocation Transfer of Responsibility With Working Circuits – The Collocation has active service terminations, such as Interconnection trunks or is serving End User Customers.

  • Disaster Recovery Plan Contractor agrees that upon request of System Agency, Contractor shall provide copies of its most recent business continuity and disaster recovery plans.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.