Most papers written on wireless security concerns address corporate LAN access. This paper discusses both corporate and industrial wireless concerns but places an emphasis on the industrial automation wireless security aspects.
This paper takes a comprehensive look at wireless security for both corporate and industrial automation networks, placing an emphasis on the industrial automation security aspects and providing guidelines needed to secure your plants wireless systems.
One of the keys to improving maintenance is the proper and intelligent use of asset information that lies locked away within the minds of a retiring workforce and within the various control systems and data warehouses common in industry.
This paper outlines a new technological development that allows the transmission of video images using low bandwidth networks for protection against sabotage and attack on our nation's critical water system infrastructure.
Sensing options enable users to choose the sensor most appropriate per application. However, making this choice is not often easy. This paper helps unravel the complexities and differences between sensor types and applications in which they are used.
This paper demonstrates how field device tool (FDT) technology standardizes the communication interface between field devices and systems, while complementing EDDL from design, installation and commissioning, to operation and maintenance, and eventual asset replacement.
This paper presents a new technology that increases the security of data and the overall usability of the solution. It facilitates integration between and with production systems, while preventing cyber attacks and unauthorized users from gaining access to critical process control data and the systems that control production.
When considering the dizzying array of factors that influence alarm design and performance, it becomes clear that the alarm system is a hotly contested item. This technical paper notes the many factors that impact the performance of an alarm system and where alarm management fits in.
This technical article looks at the principles of radio technology to explain the differences in performance between different radio bands, and explains the different characteristics between the common 2.4GHz ISM band and the lesser used 900 and 869 MHz bands in industrial environments.
This paper presents a new technology that increases the security of data and the overall usability of the solution. It facilitates integration between and with production systems -- from single plant system level through complex networks -- while preventing cyber attacks and unauthorized users from gaining access to critical process control data and the systems that control production.
I/P transducers are relatively simple devices, but there are numerous factors to take into account before selecting one. This paper provides a complete understanding of the factors involved in making the correct product selection, installation, and maintenance.
PCs running Microsoft Windows and other operating systems have worked their way into a wide variety of industrial applications, experiencing growth that outstrips competing solutions. As a result, the guts of a PC and the evolution of those components have become ever more important in automation. This White Paper provides an overview of Windows XP for embedded applications (boot options, communications and networking, memory management, protection, target system, and development tools).
Here are the 10 truths that will make you better able to engineer a new safety instrumented system, or to properly grandfather your existing system and better ensure your compliance with both the IEC standards and ANSI/ISA S84.00.01-2004.
This White Paper shows how the application of Active Model Capture Technology (AMCT) by a manufacturing plants problem-solving personnel reduces time wasted, and helps to focus the effort of these problem-solvers who must keep the process running at its best.
In the real world, sharing PCN data with external systems and accessing PCN systems from external sources is fast becoming a manufacturing necessity. This paper provides some generic guidelines for enabling secure connectivity between PCNs and external systems.
This White Paper discusses some of the options available to companies concerned with the threat of cyber attack and unauthorized network access to SCADA systems that monitor and control critical infrastructure.
This presentation provides a holistic view of both the problems and potential solutions using manufacturing industry best practices and emerging standards to secure networks, data, systems, infrastructre and applications.
As enterprise systems evolve towards increasing integration, the need has increased for inherently secure process control systems. This research report describes an initial approach to PCS technical security risk assessment, with attention to the problem of effective risk communication. This document lays the foundation for advancement of a process that focuses on the methodical assessment of risk such that the assessment results will be readily and easily communicable.
Institute for Information Infrastructure Protection
This guide is designed to impart good practice for securing industrial process control, automation, distributed control and SCADA systems. It provides an overview of the necessity for process control and SCADA system security, highlights the differences between process control and SCADA system security and IT security, and identifies seven best practices principles.