In preparation for a new book, I was able to find information about an actual Aurora event. The event affected a non-utility facility (no generator involved) where it experienced multiple Aurora events over a multi-day span resulting in damage to motors.
If the total loop deadtime becomes larger than the open loop time constant, you have a deadtime dominant loop. There is a lot of misunderstanding posed by this difficult challenge including a lot of prevalent myths. Here we look at how we get into this situation, what to expect and...
According to “official” sources, the US electric grid has never been cyber attacked. However, that is not true. There have been several cases where nation-states and others (not identified) have cyber attacked the US electric grid.
Here we finish up the extensive presentation of how to get the most out of your PID. We start with a look at the contribution of each mode and show how to estimate performance metrics from tuning settings and how excessive integral action and insufficient proportional action create oscillations.
The 2016 ICS Cyber Security Conference was held October 24-27, 2016 at Georgia Tech in Atlanta. The agenda can be found at www.icscybersecurityconference.com. Attendees represented multiple world-wide industries, defense, ICS vendors, cyber security vendors, cyber security researchers, consultants, and educators.
The demonstration of hacking the SEL751A not only showed how the system could be hacked and the operator “blinded” but also offered a solution. An SEL conference attendee, under the pretense of asking a question, told the audience the test was rigged to make the relay fail which was not...
The 2016 edition of SecurityWeek’s ICS Cyber Security Conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia. This year’s keynote speaker is Admiral Michael S. Rogers, Director of the U.S. National Security Agency (NSA) and Commander of the U.S. Cyber Command.