If the FDC is used to monitor bulk protection assets that are deemed critical then the FDC is designated as a critical cyber asset (as defined by NERC CIP Standards) especially because the FDC handles sensitive information such as baud rates, IP addresses, user ids, passwords, relay settings, targets, and fault and disturbance data records.