Voices: Other Voices

Cybersecurity: Control Systems Are Under Attack

Here, There Be Dragons. It's a Scary New World in Process Control, but You Can Defend Your Plant Against Cyber Attack

By William L. Mostia

In ancient times, map makers would sometimes mark unknown areas on a map with a dragon indicating that there were some potential hazards present in that area. The cyber world is a constantly evolving technological and social-political environment that presents a growing knowledge base of known cyber threats (which unfortunately can have the power to mutate into a new hazard) and unknown cyber hazards (our metaphorical dragons).

Read more

More from this voice

Title

Interoperability Barrier No. 1: The CIO

According to AMR, 60% of Most IT Budgets Are Spent Attempting to Deliver to 2002 Expectations

06/12/2008

Skills Gap is Reality for Adaptive Manufacturing

These Over-50 Operators and Engineers Are the Human Computers of Operations and the Only Thing Standing Between Profit and Loss

08/05/2008

Getting into Discrete

Process Meets Packaging

09/09/2008

Domino Theory

Can ISA88 and ISA95 Knock Down the Barriers Between Batch and Continuous Processing?

09/09/2008

Getting Up to Smart Speed

Use Variable Speed Drives to Save Money, but Gain Even More by Thinking Strategically and Picking Projects Carefully

09/15/2008

What’s Interoperability and Why Is It Important?

The IICI Develops Industry Consortium Establishing an ISA Interoperability Designation to Identify and Promote Interoperability Standards and Compliant Products and Systems

10/06/2008

The Wireless Hype in Process Automation

With Fuzzy Logic All of the Control Problems of the World Were to Be Easily Solved, Along with World Hunger, AIDS and Environmental Pollution.

12/08/2008

Process Automation: Harder, More Profitable

Success in Factory Automation Is No Free Ticket for Success in Process Automation

03/02/2009

Use Suppliers' Pricing Mistakes

Learn the 10 Supplier Errors That Can Put Dollars In Your Pocket

06/24/2009

Vintner Saves with Distributed Architecture

Automation In Wine Making. Winemakers Are Given the Necessary Tools to Properly Manage the End Product Flow. From Grape Growing to Bottling

08/12/2009

Voices From the Project

Shouldn't Process Automation Technology Be Easier to Engineer, Implement, Operate and Maintain?

10/12/2009

Do You Really Need to Train Them On...Everything?

Many Times Training Classes Are Ineffective because They Lack a True Training Objective

11/02/2009

Top 10 Procurement Mistakes

Read about the 10 Supplier Pricing Procurement Mistakes Organizations Face

12/14/2009

Instrumentation as a Foundation for Profit

What Is the Real Value of Instrumenting Production Processes? Control Engineers Know It. Do You?

02/02/2010

Safety and Security: Two Sides of the Same Coin

A Weakness in Security Creates Increased Risk, Which in Turn Creates a Decrease in Safety, so Safety and Security Are Directly Proportional, but Are Both Inversely Proportional to Risk

03/25/2010

Could Cyber Terrorists Attack Our Company?

Less Than 25% of the Incidents Recorded in the RISI Database Represent Intentional Attacks on Control Systems

06/02/2010

Getting OPC Security Under Control

What Do You Use OPC For? How Does Your Company Use OPC in Its Operations?

08/08/2010

The Can of Worms Is Open-Now What?

Designing a Good Cyber Defense for Your SCADA or Process Control System Is No Longer an Option

09/27/2010

How Can the NERC CIP Standards Be Improved?

The Requirements in the CIP Standards Are Pretty Good, but They Do Not Address Common Methods of Attacking a Protected Network

12/06/2010

Demanding Software Security Assurance

Users Wonder, "How Dependable, Trustworthy and Resilient Is My Supplier's Software?"

02/10/2011