According to “official” sources, the US electric grid has never been cyber attacked. However, that is not true. There have been several cases where nation-states and others (not identified) have cyber attacked the US electric grid.
Here we finish up the extensive presentation of how to get the most out of your PID. We start with a look at the contribution of each mode and show how to estimate performance metrics from tuning settings and how excessive integral action and insufficient proportional action create oscillations.
The 2016 ICS Cyber Security Conference was held October 24-27, 2016 at Georgia Tech in Atlanta. The agenda can be found at www.icscybersecurityconference.com. Attendees represented multiple world-wide industries, defense, ICS vendors, cyber security vendors, cyber security researchers, consultants, and educators.
The demonstration of hacking the SEL751A not only showed how the system could be hacked and the operator “blinded” but also offered a solution. An SEL conference attendee, under the pretense of asking a question, told the audience the test was rigged to make the relay fail which was not...
The 2016 edition of SecurityWeek’s ICS Cyber Security Conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia. This year’s keynote speaker is Admiral Michael S. Rogers, Director of the U.S. National Security Agency (NSA) and Commander of the U.S. Cyber Command.
The major types of process responses and the different worlds of process applications are presented. Additionally, the oversight of not including and understanding the contribution of automation dynamics is addressed. The discussion of the response of the PID is started.