2006

1-20 of 62 < first | prev | | last >
  • Wireless security on the plant floor

    Most papers written on wireless security concerns address corporate LAN access. This paper discusses both corporate and industrial wireless concerns but places an emphasis on the industrial automation wireless security aspects.

    ProSoft Technology
    01/18/2005
  • Wireless security on the plant floor

    This paper takes a comprehensive look at wireless security for both corporate and industrial automation networks, placing an emphasis on the industrial automation security aspects and providing guidelines needed to secure your plant’s wireless systems.

    ProSoft Technologies
    03/01/2006
  • Utilization of SCADA networks for video surveillance

    This paper outlines a new technological development that allows the transmission of video images using low bandwidth networks for protection against sabotage and attack on our nation's critical water system infrastructure.

    Longwatch
    05/05/2006
  • Unraveling the complexities of level detection

    Sensing options enable users to choose the sensor most appropriate per application. However, making this choice is not often easy. This paper helps unravel the complexities and differences between sensor types and applications in which they are used.

    Turck
    05/23/2006
  • Unlocking the promise of digital field devices

    This paper demonstrates how field device tool (FDT) technology standardizes the communication interface between field devices and systems, while complementing EDDL from design, installation and commissioning, to operation and maintenance, and eventual asset replacement.

    FDT Group
    01/30/2006
  • Tunneling process data securely through firewalls

    This paper presents a new technology that increases the security of data and the overall usability of the solution. It facilitates integration between and with production systems, while preventing cyber attacks and unauthorized users from gaining access to critical process control data and the systems that control production.

    Integration Objects
    03/06/2006
  • The real cause of alarm problems

    When considering the dizzying array of factors that influence alarm design and performance, it becomes clear that the alarm system is a hotly contested item. This technical paper notes the many factors that impact the performance of an alarm system and where alarm management fits in.

    TiPS
    08/15/2006
  • The physics of radio bands and channels

    This technical article looks at the principles of radio technology to explain the differences in performance between different radio bands, and explains the different characteristics between the common 2.4GHz ISM band and the lesser used 900 and 869 MHz bands in industrial environments.

    Elpro Technologies
    02/08/2006
  • The new case for condition monitoring

    This paper discusses how condition monitoring and condition-based maintenance have become key management strategies to deal with the severe shortage of technical staff.

    Matrikon
    04/26/2006
  • The need for secure OPC communications

    This paper presents a new technology that increases the security of data and the overall usability of the solution. It facilitates integration between and with production systems -- from single plant system level through complex networks -- while preventing cyber attacks and unauthorized users from gaining access to critical process control data and the systems that control production.

    Integration Objects
    05/29/2006
  • The ins and outs of I/P transducers

    I/P transducers are relatively simple devices, but there are numerous factors to take into account before selecting one. This paper provides a complete understanding of the factors involved in making the correct product selection, installation, and maintenance.

    ControlAir Inc.
    10/25/2006
  • The evolution of PC bus technologies

    PCs running Microsoft Windows and other operating systems have worked their way into a wide variety of industrial applications, experiencing growth that outstrips competing solutions. As a result, the guts of a PC and the evolution of those components have become ever more important in automation. This White Paper provides an overview of Windows XP for embedded applications (boot options, communications and networking, memory management, protection, target system, and development tools).

    Advantech
    07/27/2006
  • The 10 truths of safety instrumented systems

    Here are the 10 truths that will make you better able to engineer a new safety instrumented system, or to properly grandfather your existing system and better ensure your compliance with both the IEC standards and ANSI/ISA S84.00.01-2004.

    Invensys Triconex
    06/17/2006
  • Shift your focus from analysis to optimization with AMCT

    This White Paper shows how the application of Active Model Capture Technology (AMCT) by a manufacturing plant’s problem-solving personnel reduces time wasted, and helps to focus the effort of these problem-solvers who must keep the process running at its best.

    Expertune
    05/11/2006
  • Securing process control network external communications

    In the real world, sharing PCN data with external systems and accessing PCN systems from external sources is fast becoming a manufacturing necessity. This paper provides some generic guidelines for enabling secure connectivity between PCNs and external systems.

    Honeywell
    03/27/2006
  • Securing an integrated SCADA system

    This White Paper discusses some of the options available to companies concerned with the threat of cyber attack and unauthorized network access to SCADA systems that monitor and control critical infrastructure.

    Citect
    01/10/2006
  • Protecting the plant: Manufacturing IT best practices

    This presentation provides a holistic view of both the problems and potential solutions using manufacturing industry best practices and emerging standards to secure networks, data, systems, infrastructre and applications.

    EnteGreat
    03/20/2006
  • Process control system security technical risk assessment

    As enterprise systems evolve towards increasing integration, the need has increased for inherently secure process control systems. This research report describes an initial approach to PCS technical security risk assessment, with attention to the problem of effective risk communication. This document lays the foundation for advancement of a process that focuses on the methodical assessment of risk such that the assessment results will be readily and easily communicable.

    Institute for Information Infrastructure Protection
    11/20/2006
  • Process control and SCADA security best practices

    This guide is designed to impart good practice for securing industrial process control, automation, distributed control and SCADA systems. It provides an overview of the necessity for process control and SCADA system security, highlights the differences between process control and SCADA system security and IT security, and identifies seven best practices principles.

    PA Consulting Group for NISCC
    06/17/2006
1-20 of 62 < first | prev | | last >