on 'SCADA'

121-140 of 182 < first | | | last >
  • Secure your wireless information channel

    Among the obstacles that process control pioneer Dick Caro sees affecting the advance of wireless technology are the security of the information channel and powering wireless devices.

  • 10 principles for securing control systems

    KEMA Consultant Jay Abshier takes an unbiased and highly detailed look at where plant security really is, and what is being done to better protect our process automation systems and infrastructure.

  • OPC considerations for network security

    It seems that whenever IT meets real-time control systems, trouble usually erupts, but this article shows that while industrial cyber security is complex, there are ways to keep your plant assets protected.

  • Web-based DAQs spread access, information

    Modern data acquisition devices use networks, the Internet, and wireless to deliver intelligence. Senior Tech Editor Rich Merritt provides a Product Roundup of recorders and data acquisition devices.

  • The six dumbest ideas in computer security

    Marcus Ranum suggests that these dumb ideas are the fundamental reasons why all that money you spend on information security is going to be wasted, unless you somehow manage to avoid them.

  • Cyber security for the electric sector

    This article addresses the compliance cost of NERC attack prevention standards in the electric power distribution industry and just how little work gets done in a typical plant when the network is down.

  • System security: Protect your intellectual assets

    Manufacturing automation system security is more than using anti-virus software. It's an essential business strategy to protect your intellectual property — and your competitive advantage.

  • OPC for process historian data optimization

    OPC not only provides a standardized mechanism for collection of real time process data, it also enables multi-vendor historical analysis solutions that help maximize return on process history investments.

  • Keep your wireless business secure

    Wireless technologies create security vulnerabilities that can threaten your manufacturing network, but a simple plan can protect the enterprise. Find out why security continues to be a top priority in the process industries.

  • Intrusion detection and cyber security

    SecureSystems Insider Contributor Dale Peterson disucusses current SCADA security deficiencies within the process control community and how we need to find compensating security controls until secure systems are available.

  • SCADA deployment using OPC

    Integrators must differentiate between a plant-based OPC mentality and SCADA applications when attempting to apply industrial standards to SCADA-based implementations.

  • Hacking the grid: control systems under attack

    Security experts warn it wouldn’t be hard for a cyberpunk or terrorist to hack into a monitoring and control SCADA system and wreak havoc on a good portion of the U.S. (First of three parts.)

  • Protocol for SCADA field communications contributor Dale Peterson offers his review of the AGA 12 standard, a serial link encryption and authentication protocol for SCADA field communications.

  • Control system architectures: Remote control

    By using fieldbus, OPC links, secure data transmission systems, appropriate software and modern server technologies, you, too, can build your own server-based architecture. That is, if you are ready for it.

  • HART communication – Dispelling the myths

    This "special to the web" aricle is designed to increase your knowledge about the HART Field Communications Protocol. Fnd out its benefits and dispel the myths surrounding this powerful technology.

  • SCADA system specification

    Process control authority Bela Liptak brings in specialists from his cadre of co-authors to answer a reader's question. Find out where to obtain a general specification of a SCADA system.

  • Security is more than hating Microsoft

    In his June editorial for CONTROL, Editor in Chief Walt Boyes believes we are picking unfairly on the security flaws of Microsoft, while ignoring the wider implications of the problem for process automation.

  • On the bus: Design hurdles to fieldbus technology

    Ian Verhappen, Chair of the Foundation Fieldbus User Group and Vice President of Standards for ISA, offers his perspective and experience on the digital fieldbus network in this exclusive for DigitalField Insider.

  • Ten steps to secure control systems

    This "special to the web" article summarizes the 10 most important design and process principles that, while not guaranteed to secure a system, ensure your control systems are as secure as practical.

  • The cyber security assessment methodology

    Check out the methodology behind cyber security in this "special to the web" article by Jay Abshier, and assess your network’s intrusion protection/detection plan.

121-140 of 182 < first | | | last >