Voices: Other Voices

Cybersecurity: Control Systems Are Under Attack

Here, There Be Dragons. It's a Scary New World in Process Control, but You Can Defend Your Plant Against Cyber Attack

By William L. Mostia

In ancient times, map makers would sometimes mark unknown areas on a map with a dragon indicating that there were some potential hazards present in that area. The cyber world is a constantly evolving technological and social-political environment that presents a growing knowledge base of known cyber threats (which unfortunately can have the power to mutate into a new hazard) and unknown cyber hazards (our metaphorical dragons).

Read more

More from this voice

Title

Getting into Discrete

Process Meets Packaging

09/09/2008

Getting Up to Smart Speed

Use Variable Speed Drives to Save Money, but Gain Even More by Thinking Strategically and Picking Projects Carefully

09/15/2008

Getting OPC Security Under Control

What Do You Use OPC For? How Does Your Company Use OPC in Its Operations?

08/08/2010

Finding Faults in Enterprise Asset Management Systems

Giant Swedish Mine Counts on an Integrated EAM System to Make Fault Reporting and Predictive Maintenance Easier

11/06/2012

Fieldbus Is Easy With Portable, Wireless Tools

Why Use Portable Tools? Find Out Its Benefits

04/02/2013

Feeding the Asset Management Beast

Will the Work Underway at IEC on the Digital Factory and Similar Initiatives Help Integrate All the Disparate Standards Into a Unified Whole?

03/07/2014

Farewell to Standardization: Wireless and FDI

Will There Be One Standard for Wireless and One Standard for Field Device Integration?

02/06/2012

FDT Expands Its Industrial Network Footprint

FDT Is Like a 'Swiss Army Knife,' Enabling the Viewing of In-Depth Device Information From Multiple Protocols in a Single Environment

11/18/2013

Effectively Harnessing Emissions Compliance Data

Build Stakeholder Confidence Through the Creation of Timely, Accurate, Retrievable and Consistent Emissions Information

08/06/2014

Domino Theory

Can ISA88 and ISA95 Knock Down the Barriers Between Batch and Continuous Processing?

09/09/2008

Do You Really Need to Train Them On...Everything?

Many Times Training Classes Are Ineffective because They Lack a True Training Objective

11/02/2009

Developing Control System Security Standards

Are There Several Standards in the Area of Control Systems Security?

06/01/2012

Demanding Software Security Assurance

Users Wonder, "How Dependable, Trustworthy and Resilient Is My Supplier's Software?"

02/10/2011

Could Cyber Terrorists Attack Our Company?

Less Than 25% of the Incidents Recorded in the RISI Database Represent Intentional Attacks on Control Systems

06/02/2010

Comprehensive Training Prepares Kuwaitis to Take Over Refinery

Workforce Effectiveness Begins With an Assessment of the Customer's Unique Needs

10/28/2013

Collaboration Isn't Just for People

Today's Collaborative Infrastructure Can Bring Together Devices and Applications, Too.

10/31/2013

Choose and Manage Your Automation Suppliers Carefully

How Can We Manage Our Supplier Performance to Achieve Optimum Long-Term Results

09/15/2014

Championship Season for Industrial Instrumentation

How Potash Upgraded Its Systems, Training and Instrumentation Workforce All at the Same Time

09/15/2014

Bringing the Lincoln Paper Mill Back from the Dead

Lincoln Paper Wasn't Even a Zombie Company. It Was Dead. Closed. Kaput. Then New Owners Brought in Multivariable Testing to Help Resurrect It Through a Top-to-Bottom Revamp of Procedures, Processes and Plant Culture

05/13/2013

Best Practices in High-Performance HMI Design

Having a Solid Foundation to Build On Is Extremely Important, and Having an Enforced Policy That Ensures Compliance Is Just As Important

10/03/2012