Articles

on 'SCADA'

101-120 of 174 < first | | | last >
  • Raising the bar for control system security

    Security researchers at Wurldtech Analytics are partnering with ISA to establish procedures and an operations model for the security testing and certification of products used for control.

    08/07/2006
  • The ABCs of XML: Part I

    This three-part series for CONTROL introduces readers to the basic rules of XML, its terminology and related standards, and discusses what you’ll need to know to survive in the world of connected data.

    06/12/2006
  • Data logger size matters

    New requirements and regulations are constantly being foisted on you and your plant, and many of these requirements necessitate acquisition and recording of data. Compact data loggers offer a solution.

    04/17/2006
  • Are your security practices up to IT standards?

    Joe Weiss and Jay Abshier, world class security consultants for process automation, write about the battle between the world of IT and Plant Operations. So, who’s right in the fight for control system security?

    03/14/2006
  • The do's and don't of securing your data

    So what should you be doing? Well there are a number of steps to consider. The following guideline is designed to protect company information and help keep your industrial systems secure.

    02/14/2006
  • Security: A Practical Approach to Plant Protection

    Just thinking about the possible threats out there today can give you sleepless nights. Here’s a calm look at principles, approaches and practical tools you can use to increase security at your facility.

    01/10/2006
  • A word about cyber security

    A determined hacker can wreak havoc with your plant or steal your secrets without blinking an eye. But don't leave it to the folks in the IT Department to protect your control systems. Read why.

    01/10/2006
  • Who's working at your plant?

    The backgrounds of intruders may be a mystery, but the backgrounds of people regularly on your site shouldn't be. How carefully does your company check the references of people at your plant?

    01/10/2006
  • A disaster safety checklist

    There is no one-size-fits-all solution for business resumption following a negative event. However, ASSE offers this safety and security checklist to assist you before, during and after a disaster.

    01/10/2006
  • What you should know about plant security

    By being aware of the red flags, process plant personnel can enhance the potential for preventing security breaches in their industrial control systems.

    01/10/2006
  • Safety is no accident

    Plant safety and security has never been more important given the current political climate. Here are some web resources for a coordinated, plant-wide response to madness and mayhem.

    01/10/2006
  • Want to see something really scary?

    Getting into your control system requires skill, but it's not beyond the ability of a professional hacker who is being paid to get into your system undetected.

    12/13/2005
  • Secure your wireless information channel

    Among the obstacles that process control pioneer Dick Caro sees affecting the advance of wireless technology are the security of the information channel and powering wireless devices.

    12/13/2005
  • 10 principles for securing control systems

    KEMA Consultant Jay Abshier takes an unbiased and highly detailed look at where plant security really is, and what is being done to better protect our process automation systems and infrastructure.

    10/11/2005
  • OPC considerations for network security

    It seems that whenever IT meets real-time control systems, trouble usually erupts, but this article shows that while industrial cyber security is complex, there are ways to keep your plant assets protected.

    10/11/2005
  • Web-based DAQs spread access, information

    Modern data acquisition devices use networks, the Internet, and wireless to deliver intelligence. Senior Tech Editor Rich Merritt provides a Product Roundup of recorders and data acquisition devices.

    10/11/2005
  • The six dumbest ideas in computer security

    Marcus Ranum suggests that these dumb ideas are the fundamental reasons why all that money you spend on information security is going to be wasted, unless you somehow manage to avoid them.

    09/13/2005
  • Cyber security for the electric sector

    This article addresses the compliance cost of NERC attack prevention standards in the electric power distribution industry and just how little work gets done in a typical plant when the network is down.

    09/13/2005
  • System security: Protect your intellectual assets

    Manufacturing automation system security is more than using anti-virus software. It's an essential business strategy to protect your intellectual property — and your competitive advantage.

    08/30/2005
  • OPC for process historian data optimization

    OPC not only provides a standardized mechanism for collection of real time process data, it also enables multi-vendor historical analysis solutions that help maximize return on process history investments.

    08/25/2005
101-120 of 174 < first | | | last >