2006

1-20 of 62 < first | prev | | last >
  • Control systems cyber security awareness

    This White Paper is the first installment in a series intended to provide relevant cyber security information to the control systems community. It raises cyber security awareness through discussion of control system cyber security trends and provides information on Homeland Security and federal partner programs designed to enhance the cyber security posture of control systems within critical infrastructures.

    US-CERT
    07/10/2006
  • Unraveling the complexities of level detection

    Sensing options enable users to choose the sensor most appropriate per application. However, making this choice is not often easy. This paper helps unravel the complexities and differences between sensor types and applications in which they are used.

    Turck
    05/23/2006
  • Applied Alarm Management Using Six Sigma

    The Control article "Six Sigma Alarm Management" highlights an end user's experience applying Six Sigma practices to his alarm management effort. This white paper by TiPS, explores why Six Sigma is such a good companion for an alarm management program and outlines various ways Six Sigma can be incorporated into the alarm management workflow.

    TiPS
    03/21/2008
  • The real cause of alarm problems

    When considering the dizzying array of factors that influence alarm design and performance, it becomes clear that the alarm system is a hotly contested item. This technical paper notes the many factors that impact the performance of an alarm system and where alarm management fits in.

    TiPS
    08/15/2006
  • Five techniques for preventing unplanned downtime

    Alarm management is one of the most undervalued and underutilized facets of process automation today. This White Paper demonstrates the five most important alarm management techniques that can help you prevent unplanned downtime.

    Siemens E&A
    09/11/2006
  • Common control system vulnerabilities

    This report describes the generalized trends in vulnerabilities observed from control and automation IT systems used in critical infrastructures, as well as typical reasons for these security issues and an introduction to an effective mitigation strategy.

    Sandia National Labs
    02/14/2006
  • Efficiency: The forgotten feature of power supplies

    Efficiency is one of the most important features that every engineer must consider when selecting a power supply. This White Paper maintains that it is possible to use a smaller power supply because no de-rating is necessary, in most cases.

    Puls Power Supplies
    04/25/2006
  • Wireless security on the plant floor

    Most papers written on wireless security concerns address corporate LAN access. This paper discusses both corporate and industrial wireless concerns but places an emphasis on the industrial automation wireless security aspects.

    ProSoft Technology
    01/18/2005
  • Wireless security on the plant floor

    This paper takes a comprehensive look at wireless security for both corporate and industrial automation networks, placing an emphasis on the industrial automation security aspects and providing guidelines needed to secure your plant’s wireless systems.

    ProSoft Technologies
    03/01/2006
  • Innovative defense strategies for securing SCADA and control systems

    This White Paper takes a look at the fundamental issues with the current practice of securing SCADA and control systems, discusses the concept of security zones of vulnerabilities, and briefly introduces several new and unique cyber defense solutions that can be deployed at each security zone.

    PlantData Technologies
    06/09/2006
  • Applying Power-over-Ethernet in Industrial Networking

    Power-over-Ethernet is fast becoming the best solution for powering industrial networks. This paper describes the benefits of using PoE for control applications on the factory floor, including utilization of an RPS, time and cost savings, ease of implementation, versatility of plant design, and safety advantages.

    Phihong
    06/14/2006
  • Process control and SCADA security best practices

    This guide is designed to impart good practice for securing industrial process control, automation, distributed control and SCADA systems. It provides an overview of the necessity for process control and SCADA system security, highlights the differences between process control and SCADA system security and IT security, and identifies seven best practices principles.

    PA Consulting Group for NISCC
    06/17/2006
  • Applying NIST SP 800-53 to industrial control systems

    The National Institute of Standards and Technology (NIST) has established an Industrial Control System Security Project to improve the security of public and private sector Industrial Control Systems (ICSs).

    NIST
    11/10/2006
  • Optimizing results in automation projects with simulation

    The use of the simulation systems for testing and training process automation projects has been proven to reduce time-to-market and increase business results. This White Paper shows how the same systems can be utilized in automation lifecycle management to reduce operational costs and improve product quality.

    Mynah Technologies
    07/24/2006
  • GAMP4 guidelines concerning the use of process simulation software

    This paper discusses GAMP4 guidelines concerning the use of process simulation software, the impact of system testing and qualification of the software on project risk mitigation, and GAMP4 requirements for suppliers of process simulation software.

    Mynah Technologies
    07/02/2006
  • IEC 61508 and Functional Safety System Selection

    This paper provides an introduction to IEC 61508, describes an illustrative application example using the MOST SafetyNet System, and offers parameters that should be considered when choosing a safety instrumented system.

    MTL
    05/08/2006
1-20 of 62 < first | prev | | last >