Wireless technologies have been used for decades in the water/waste water industry in a multitude of applications including tank level indication, pump and motor control, flow and pressure monitoring, etc. However, recent concerns regarding the potential for hacking and cyber-attacks into these wireless systems have raised the importance of wireless security to a new high. This paper will discuss security issues within an Industrial Wireless Network, and address the ways in which these networks can be designed to be more reliable while being more secure.10/22/2013
Process engineering has undergone significant transformation over the years, catalyzed by advances and innovation in software both within individual disciplines and also in the integration across the workflow.07/03/2013
Plant safety is at or very near the top of almost every manufacturer's operating priority list, often with a stated goal of zero incidents or accidents.06/13/2013
The security of industrial automation and control systems becomes increasingly critical as different networks are connected and systems are integrated in a collaborative manufacturing environment. For industrial automation and control systems the potential impact of an attack maybe more serious than for computer systems in general. Users of industrial automation and control systems need to pay correspondingly increased attention to these issues.05/15/2013
This year's ABB Automation & Power World, held March 25-28 in Orlando, Fla., included a broad range of need-to-know presentations for automation and power professionals on topics ranging from cybersecurity concerns to efficiency and reliability, and data power usage.04/15/2013
The approach that both government and business has taken to ICS cybersecurity of critical infrastructure assets over the last 10 years is systemically flawed and doomed to failure03/04/2013
The Use of Surge Protective Devices in Mitigating the Effects of Lightning Strikes in Offshore Oil Applications
Recognizing the prevalence of lightning strikes in the Gulf of Mexico region, several system specifications and practices written for lightning mitigation have been applied and implemented in offshore applications over the last decade.02/18/2013
This paper covers the importance of securing automation devices for access internally on an Intranet, or externally over the Internet. Choosing an Ethernet Fieldbus offers the competitive advantage of speed, flexibility and accessibility though steps should be taken to secure automation devices and any associated programming workstations and servers. This paper seeks to educate the Controls Engineer on security strategies, technologies and options available.02/13/2013
This Control Essentials Guide is the first in a continuing series of interactive PDFs by the editors of Control. Essentials of Safety Instrumented Systems is designed to provide process industry professionals with an up-to-date, top-level understanding of the most important SIS issues. From fundamental concepts and terminology to the ongoing debate over integrated vs. stand-alone safety systems, get up to speed quickly on the key technology and marketplace drivers.01/28/2013
This article describes two independent techniques for ensuring strong security in systems using OPC Classic technology01/14/2013
Preventing the next Stuxnet-like attack on the control world might be impossible, but operators can mitigate the effects and contain worms and viruses through early detection.01/07/2013
Industrial control networks are highly vulnerable to intelligent remote attacks, as well as non-intelligent viruses. With threats to these networks increasing in complexity and scope, decision makers need to take action before it's too late.01/04/2013
This paper examines the benefits and shortfalls of both safety PLCs and configurable safety relays. It also examines a new way of handling safety in industrial automation, "SafetyBridge" technology.01/02/2013
This White Paper explains:
- What the 3S CoDeSys vulnerabilities are and what an attacker can do with them
- How to find out what control/SCADA devices are affected
- The risks and potential consequences to SCADA and control systems
- The compensating controls that will help block known attack vectors
A number of security vulnerabilities in the CoDeSys Control Runtime System were disclosed in January 2012. In October 2012, fully functional attack tools were also released to the general public.
While CoDeSys is not widely known in the SCADA and ICS field, its product is embedded in many popular PLCs and industrial controllers. Many vendors are potentially vulnerable, and include devices used in all sectors of manufacturing and infrastructure. As a result, there is a risk that criminals or political groups may attempt to exploit them for either financial or ideological gain.
This White Paper summarizes the currently known facts about these vulnerabilities and associated attack tools. It also provides guidance regarding a number of mitigations and compensating controls that operators of SCADA and ICS systems can take to protect critical operations.12/26/2012
Some 66% of the process control systems now in use globally were installed before publication of today's commonly used safety standards, IEC 61508 and IEC 61511/ISA 84. Here's how to tell if you safety systems are up to snuff.12/13/2012
The editors of Control and Control Design compiled this special report from the 21st annual Automation Fair event, hosted by Rockwell Automation, in Philadelphia, November 5-8. This interactive PDF includes more than 20 articles documenting highlights ranging from executive keynotes and new product announcements to vertical industry forums and Rockwell Automation Process Solutions User Group and Safety Automation Forum meetings.12/11/2012
Updated government regulations created a need for a major international oil and gas company to install a direct, real-time communications link at a platform located off the coast of Louisiana in the Gulf of Mexico.
ENI Petroleum is an Italian multinational oil and gas company with around 78,400 employees at sites in 77 countries. ENI operates in the oil and gas, electricity generation and sales, petrochemicals, oil field services construction and engineering industries. It has oil and natural gas production of almost two million barrels per day, with exploration and production efforts at sites throughout North American, Africa and Asia.
One of these production locations is an oil well platform called the "Devil's Tower" that is located just off the coast of Louisiana in the Mississippi Canyon region of the Gulf of Mexico. The platform rises 5,610 ft. above the sea bed. Until 2010, it was the deepest production truss spar in the world. Drill ships perform periodic operations within close proximity to subsea pipelines that transport oil and gas to and from the production platform.
In this white paper, you will learn how a new data concentrator system allowed the control room and drill ships to communicate at a distance of more than 100 km, providing security in case of an incident while avoiding costly shutdowns.11/08/2012
An Objective Look at the Roles of Cesium-137 and Cobalt-60 in Nuclear Measurement Systems for Industrial Processes
Level and density measurements in process control are performed by a number of technologies. When the process temperature, pressure, or chemistry is an issue, then nuclear measurement systems have the advantage. These are non-invasive to the vessel and unaffected by the process pressures and chemistries.
Overall, a nuclear measurement system used for process control consists of a gamma energy emitter and detector. An emitter is placed on one side of a vessel to broadcast a beam of energy to the opposite side of the vessel. The detector is placed in the beam on the opposite side of the vessel. The detector will scintillate in the presence of gamma energy and register counts proportional to the field strength. When the process value (level or specific gravity) is low, the detector will register a high number of counts since less gamma energy is blocked by the process material. When the process value is high, more of the gamma energy is blocked which leads to fewer counts.
The two most common gamma emitters used for level and density process measurements are isotopes of cobalt and cesium. The goal of this article is an objective comparison of the roles of cesium-137 and cobalt-60 in process measurement. This will be accomplished by reviewing the properties of the two materials and then comparing the use of the materials in process measurement.11/05/2012
With any new tech device, whether a cell phone or plant-floor controller, there is inevitably a helpful feature or two you overlooked while reading the manual or taking the introductory tutorial. Although these technological devices still perform their desired, basic functions - discovering an underutilized feature makes you wonder how you ever operated the device without it.
Interacting with alarms is one of the basic functions your operators expect from their human-machine interface (HMI) software. However, if you're only using the standard alarming functions, you may be missing out on lesser-known features that could help you save time, ease troubleshooting and reduce headaches. The five FactoryTalk Alarms and Events functions listed below are often overlooked and underutilized. See where they fit and if you can find some hidden tools in your plant-floor applications.08/29/2012
Flameproof enclosure (Ex d) and intrinsic safety (Ex i) are very common equipment protection methods in Process Automation. One reason to use Ex d is the amount of energy which could not be provided via Ex i. This disadvantage has gone with the introduction of intrinsically safe, dynamic methods of arc prevention such as DART or Power-i. This white paper shows that when using intrinsic safety, installation, maintenance and inspection costs will be reduced.
This paper addresses decision makers and professionals responsible for automation systems in hazardous areas. A good understanding of the principles of explosion protection is required.07/10/2012