White Papers

on 'SCADA'

21-40 of 65 < first | | | last >
  • Understanding OPC and how it is deployed

    This whitepaper is the first in a series on the security of OPC (OLE for Process Control) and focuses on providing an overview of the widely-used industrial communication standard and how it is actually used in industry.

    British Columbia Institute of Technology (BCIT), Digital Bond and Byres Research
    04/13/2007
  • Security incidents and trends in the SCADA and process industries

    This report presents evidence in support of a business case for improving security of Supervisory Control and Data Acquisition (SCADA), process control networks (PCN), and manufacturing and industrial automation systems based on an analysis of statistical trends in security incidents.

    Symantec Inc., and Byres Security Inc.
    03/19/2007
  • Process control system security technical risk assessment

    As enterprise systems evolve towards increasing integration, the need has increased for inherently secure process control systems. This research report describes an initial approach to PCS technical security risk assessment, with attention to the problem of effective risk communication. This document lays the foundation for advancement of a process that focuses on the methodical assessment of risk such that the assessment results will be readily and easily communicable.

    Institute for Information Infrastructure Protection
    11/20/2006
  • Applying NIST SP 800-53 to industrial control systems

    The National Institute of Standards and Technology (NIST) has established an Industrial Control System Security Project to improve the security of public and private sector Industrial Control Systems (ICSs).

    NIST
    11/10/2006
  • Know where you are vulnerable

    In this online video presentation (.wmv, 4.77 MB), industrial security expert, Rick Kaun, explains the importance of industrial security, and how plants can ensure that all security threats, especially those most commonly overlooked, are addressed.

    ControlGlobal.com
    11/03/2006
  • Cyber security procurement language for control systems

    This document summarizes important security principles that should be considered when designing and procuring control systems products (software, systems and networks), and provides example language to incorporate into specifications that address these concerns.

    Idaho National Laboratory
    08/08/2006
  • Control systems cyber security awareness

    This White Paper is the first installment in a series intended to provide relevant cyber security information to the control systems community. It raises cyber security awareness through discussion of control system cyber security trends and provides information on Homeland Security and federal partner programs designed to enhance the cyber security posture of control systems within critical infrastructures.

    US-CERT
    07/10/2006
  • Process control and SCADA security best practices

    This guide is designed to impart good practice for securing industrial process control, automation, distributed control and SCADA systems. It provides an overview of the necessity for process control and SCADA system security, highlights the differences between process control and SCADA system security and IT security, and identifies seven best practices principles.

    PA Consulting Group for NISCC
    06/17/2006
  • Innovative defense strategies for securing SCADA and control systems

    This White Paper takes a look at the fundamental issues with the current practice of securing SCADA and control systems, discusses the concept of security zones of vulnerabilities, and briefly introduces several new and unique cyber defense solutions that can be deployed at each security zone.

    PlantData Technologies
    06/09/2006
  • The need for secure OPC communications

    This paper presents a new technology that increases the security of data and the overall usability of the solution. It facilitates integration between and with production systems -- from single plant system level through complex networks -- while preventing cyber attacks and unauthorized users from gaining access to critical process control data and the systems that control production.

    Integration Objects
    05/29/2006
  • Shift your focus from analysis to optimization with AMCT

    This White Paper shows how the application of Active Model Capture Technology (AMCT) by a manufacturing plant’s problem-solving personnel reduces time wasted, and helps to focus the effort of these problem-solvers who must keep the process running at its best.

    Expertune
    05/11/2006
  • Utilization of SCADA networks for video surveillance

    This paper outlines a new technological development that allows the transmission of video images using low bandwidth networks for protection against sabotage and attack on our nation's critical water system infrastructure.

    Longwatch
    05/05/2006
  • Industrial security and compliance

    This paper talks about each of the areas of concentration for process sucurity in detail--people, processes and technology--as well as the priority of developing a security philosophy which will in turn foster a security culture.

    Matrikon
    04/26/2006
  • Securing process control network external communications

    In the real world, sharing PCN data with external systems and accessing PCN systems from external sources is fast becoming a manufacturing necessity. This paper provides some generic guidelines for enabling secure connectivity between PCNs and external systems.

    Honeywell
    03/27/2006
  • Protecting the plant: Manufacturing IT best practices

    This presentation provides a holistic view of both the problems and potential solutions using manufacturing industry best practices and emerging standards to secure networks, data, systems, infrastructre and applications.

    EnteGreat
    03/20/2006
  • Wireless security on the plant floor

    This paper takes a comprehensive look at wireless security for both corporate and industrial automation networks, placing an emphasis on the industrial automation security aspects and providing guidelines needed to secure your plant’s wireless systems.

    ProSoft Technologies
    03/01/2006
  • IT security in industrial plants

    This article serves as a tutorial on IT security for industrial systems. Security objectives are explained, attack types are illustrated, and available and suggested countermeasures and general good practices are described.

    ABB
    02/14/2006
21-40 of 65 < first | | | last >