Articles

on 'SCADA'

121-140 of 174 < first | | | last >
  • Keep your wireless business secure

    Wireless technologies create security vulnerabilities that can threaten your manufacturing network, but a simple plan can protect the enterprise. Find out why security continues to be a top priority in the process industries.

    08/22/2005
  • Intrusion detection and cyber security

    SecureSystems Insider Contributor Dale Peterson disucusses current SCADA security deficiencies within the process control community and how we need to find compensating security controls until secure systems are available.

    08/09/2005
  • SCADA deployment using OPC

    Integrators must differentiate between a plant-based OPC mentality and SCADA applications when attempting to apply industrial standards to SCADA-based implementations.

    08/01/2005
  • Hacking the grid: control systems under attack

    Security experts warn it wouldn’t be hard for a cyberpunk or terrorist to hack into a monitoring and control SCADA system and wreak havoc on a good portion of the U.S. (First of three parts.)

    07/13/2005
  • Protocol for SCADA field communications

    ControlGlobal.com contributor Dale Peterson offers his review of the AGA 12 standard, a serial link encryption and authentication protocol for SCADA field communications.

    07/13/2005
  • Control system architectures: Remote control

    By using fieldbus, OPC links, secure data transmission systems, appropriate software and modern server technologies, you, too, can build your own server-based architecture. That is, if you are ready for it.

    06/20/2005
  • HART communication – Dispelling the myths

    This "special to the web" aricle is designed to increase your knowledge about the HART Field Communications Protocol. Fnd out its benefits and dispel the myths surrounding this powerful technology.

    06/10/2005
  • SCADA system specification

    Process control authority Bela Liptak brings in specialists from his cadre of co-authors to answer a reader's question. Find out where to obtain a general specification of a SCADA system.

    06/07/2005
  • Security is more than hating Microsoft

    In his June editorial for CONTROL, Editor in Chief Walt Boyes believes we are picking unfairly on the security flaws of Microsoft, while ignoring the wider implications of the problem for process automation.

    06/01/2005
  • On the bus: Design hurdles to fieldbus technology

    Ian Verhappen, Chair of the Foundation Fieldbus User Group and Vice President of Standards for ISA, offers his perspective and experience on the digital fieldbus network in this exclusive for DigitalField Insider.

    05/30/2005
  • Ten steps to secure control systems

    This "special to the web" article summarizes the 10 most important design and process principles that, while not guaranteed to secure a system, ensure your control systems are as secure as practical.

    05/12/2005
  • The cyber security assessment methodology

    Check out the methodology behind cyber security in this "special to the web" article by Jay Abshier, and assess your network’s intrusion protection/detection plan.

    05/12/2005
  • Dispelling the myths of HART-enabled devices

    Even though millions of HART-enabled field devices are installed in locations around the world, myths and misconceptions about this powerful technology for control systems abound.

    04/19/2005
  • Security could put process control under IT

    With new technology and strategies being developed to protect industrial systems from current and future threats, process control needs to figure out where it's going, according to IA Insider's Andrew Bond.

    04/12/2005
  • Patching SCADA systems

    Since the SCADA community is forced to live with unpatched systems with many known vulnerabilities, compensating security controls are required, according to this "special to the web" article by Dale Peterson

    04/11/2005
  • Digital data recorders deliver

    This month's Technically Speaking column compares mechanical, analog and digital recorders for data acquisition and concludes that local data logging can be the easiest way to satisfy regulatory requirements.

    03/29/2005
  • Hackers target U.S. power grid

    Government quietly warns utilities to beef up their computer security over heightened concerns that electric companies have failed to adequately fortify defenses against a potential catastrophic strike.

    03/25/2005
  • In the trenches of Fieldbus War II

    Like the 20th Century’s Great Conflict, the first Fieldbus War never really ended. But what will the outcome be this time? CONTROL writer Ian Verhappen takes an educated guess on how the battle may turn out.

    03/01/2005
121-140 of 174 < first | | | last >