Voices: Security Focus

Cyber Warfare and the Control Systems Community

What Must the Control Systems Community Do to Adapt to the Threat of Cyber Warfare?

Robert Lee By Robert M. Lee[mailto:robertmichael.lee@gmail.com], Cyberspace Officer, USAF

Read more

More from this voice


10 principles for securing control systems

KEMA Consultant Jay Abshier takes an unbiased and highly detailed look at where plant security really is, and what is being done to better protect our process automation systems and infrastructure.


A disaster safety checklist

There is no one-size-fits-all solution for business resumption following a negative event. However, ASSE offers this safety and security checklist to assist you before, during and after a disaster.


A word about cyber security

A determined hacker can wreak havoc with your plant or steal your secrets without blinking an eye. But don't leave it to the folks in the IT Department to protect your control systems. Read why.


Are your security practices up to IT standards?

Joe Weiss and Jay Abshier, world class security consultants for process automation, write about the battle between the world of IT and Plant Operations. So, who’s right in the fight for control system security?


Cyber security for the electric sector

This article addresses the compliance cost of NERC attack prevention standards in the electric power distribution industry and just how little work gets done in a typical plant when the network is down.


Do Firms Expect Too Much Cyber Threat Data?

A Key Expectation from Industry Is for Actionable Cyber-Threat Information from the Federal Government


Edge protection a first layer of defense-in-depth security

Control system security expert Eric Byres presents defense-in-depth strategies for process control systems to some 150 attendees at the Honeywell Users' Group Americas 2007 Symposium in Phoenix.


Hacking the grid: control systems under attack

Security experts warn it wouldn’t be hard for a cyberpunk or terrorist to hack into a monitoring and control SCADA system and wreak havoc on a good portion of the U.S. (First of three parts.)


How Shell E&P assesses and addresses control system security risks

Dan McDougall of Shell Exploration and Production speaks about the company’s drive to ensure security of its global assets at the Honeywell User Group Americas 2007 Symposium in Phoenix.


Intrusion detection and cyber security

SecureSystems Insider Contributor Dale Peterson disucusses current SCADA security deficiencies within the process control community and how we need to find compensating security controls until secure systems are available.


Invensys appointment signals shift of emphasis to services

Here are excerpts from the February 2007 issue of Andrew Bond’s Industrial Automation Insider, a monthly newsletter covering the important industrial automation news and issues as seen from the U.K.


OPC considerations for network security

It seems that whenever IT meets real-time control systems, trouble usually erupts, but this article shows that while industrial cyber security is complex, there are ways to keep your plant assets protected.


Practical methods for protecting industrial networks

The Fall Issue of Industrial Networking magazine features a cover story that discusses ways process control engineers can protect against potentially destructive attacks on vulnerable networks.


Protecting ICSs from Electronic Threats, II

ICS Security Is a Lifecycle Process that Begins With Conceptual Design of a System and Continues Through to Its Retirement


Protecting ICSs from Electronic Threats, Part 1

It Takes a Team of Experts in IT Security, Telecom, Networking, ICS and More to Understand Cyber Security


Protocol for SCADA field communications

ControlGlobal.com contributor Dale Peterson offers his review of the AGA 12 standard, a serial link encryption and authentication protocol for SCADA field communications.


Raising the bar for control system security

Security researchers at Wurldtech Analytics are partnering with ISA to establish procedures and an operations model for the security testing and certification of products used for control.


SCADA system makers pushed toward security

Idaho National Laboratory and the New York State Office of Cyber Security and Critical Infrastructure have teamed up with utilities and makers of distributed control system software to offer advice on how to make system security a major part of the critical infrastructure.


Safety is no accident

Plant safety and security has never been more important given the current political climate. Here are some web resources for a coordinated, plant-wide response to madness and mayhem.


SecureSystems Insider: Archived issues

SecureSystems Insider probes the latest system advances designed to safely control and secure your critical SCADA control systems.