This White Paper features extensive information on various types of alarm trips, their effective applications and safety factors, and addresses other considerations that need to be made when implementing an alarm trip strategy.
This White Paper demonstrates that for accurate thermal measurement, the advantage of higher resolution is that the range to the target can be increased, making for easier measurements from a distance.
This paper will discuss how refiners can optimize their information management by changing their business processes and adding additional applications, while not putting any additional data collection or management burden on operations.
While it was initially esoteric, Object Oriented Programming (OOP) crept into mainstream Information Technology (IT) applications by the mid 1980s. A decade later, the very popular incarnation of these object-based process control applications has arrived in the form of OPC client/server technology.
This paper talks about each of the areas of concentration for process sucurity in detail--people, processes and technology--as well as the priority of developing a security philosophy which will in turn foster a security culture.
One of the keys to improving maintenance is the proper and intelligent use of asset information that lies locked away within the minds of a retiring workforce and within the various control systems and data warehouses common in industry.
This paper outlines a new technological development that allows the transmission of video images using low bandwidth networks for protection against sabotage and attack on our nation's critical water system infrastructure.
Here are the 10 truths that will make you better able to engineer a new safety instrumented system, or to properly grandfather your existing system and better ensure your compliance with both the IEC standards and ANSI/ISA S84.00.01-2004.
This paper presents a new technology that increases the security of data and the overall usability of the solution. It facilitates integration between and with production systems, while preventing cyber attacks and unauthorized users from gaining access to critical process control data and the systems that control production.
This paper presents a new technology that increases the security of data and the overall usability of the solution. It facilitates integration between and with production systems -- from single plant system level through complex networks -- while preventing cyber attacks and unauthorized users from gaining access to critical process control data and the systems that control production.
As enterprise systems evolve towards increasing integration, the need has increased for inherently secure process control systems. This research report describes an initial approach to PCS technical security risk assessment, with attention to the problem of effective risk communication. This document lays the foundation for advancement of a process that focuses on the methodical assessment of risk such that the assessment results will be readily and easily communicable.
Institute for Information Infrastructure Protection
This document summarizes important security principles that should be considered when designing and procuring control systems products (software, systems and networks), and provides example language to incorporate into specifications that address these concerns.
As the population of valves and safety relief valves continues to grow so do leak detection and repair costs. New wireless technologies offer the potential to reduce these costs significantly while providing access to many new monitor points previously not accessible.
In the real world, sharing PCN data with external systems and accessing PCN systems from external sources is fast becoming a manufacturing necessity. This paper provides some generic guidelines for enabling secure connectivity between PCNs and external systems.
From traditional narrow-band to more complex spread-spectrum technologies, a variety of RF communication techniques are available for deployment in industrial environments. Presented and evaluated here, in terms of their relative security and integrity performance, are the most common narrow-band and spread-spectrum alternatives.
Many industrial facilities are already deploying wireless networks for targeted requirements. To help plants get ready for this future, this paper presents considerations and questions to ask in preparing for how this emerging technology can enable robust business results.