Displaying 1–25 of 73 results for SCADA
The purpose of this paper is to explore the particular ways in which operators can tightly integrate wireless instrumentation networks with SCADA and realize.</p> <p>Integrating wireless instrumentation with SCADA systems can drive operational efficiency and reduce deployment costs.</p> <p>The ...
This guide is designed to impart good practice for securing industrial process control, automation, distributed control and SCADA systems. It provides an overview of the necessity for process control and SCADA system security, highlights the differences between process control and SCADA system ...
This White Paper provides a non-technical overview of critical infrastructure SCADA security and gives a background on SCADA systems and the history of critical infrastructure concern.
Discover the top 3 reasons SCADA software can hold you back, what technological advancements you can use to get ahead, and how merging SCADA and IT can have a powerful effect on your company.
The Presidents Critical Infrastructure Protection Board, and the Department of Energy, have developed the steps outlined here to help any organization improve the security of its SCADA networks.
This White Paper takes a look at the fundamental issues with the current practice of securing SCADA and control systems, discusses the concept of security zones of vulnerabilities, and briefly introduces several new and unique cyber defense solutions that can be deployed at each security zone.
This report presents evidence in support of a business case for improving security of Supervisory Control and Data Acquisition (SCADA), process control networks (PCN), and manufacturing and industrial automation systems based on an analysis of statistical trends in security incidents.
This White Paper discusses some of the options available to companies concerned with the threat of cyber attack and unauthorized network access to SCADA systems that monitor and control critical infrastructure.
The sensitive nature of PLC and DCS devices requires a higher level of network segmentation and advanced defense solutions. This "special to the web" White Paper defines the problem and introduces a new approach to distributing a firewall throughout your SCADA and industrial networking environment.
This white paper provides insight into the evolution of the modern SCADA system and looks to the very near future
This special to the web briefing report from the Office of the Inspector General evaluates the impediments and barriers that prevent water systems and other Power-Gen plants from securing known SCADA vulnerabilities.
On September 11, 2001, America was attacked by terrorists and the United States quickly acknowledged vulnerabilities at our airports, borders, food supply and water supply systems. Soon after, the government required vulnerability assessments (VAs) for all municipalities with large cities ...
The EU's cybersecurity Agency ENISA released this white paper, giving recommendations regarding prevention and preparedness for an agile and integrated response to cybersecurity attacks and incidents against industrial control systems (ICS)/SCADA.
<p>Is Moving Your SCADA System to the Cloud Right For Your Company?</p> <p>Cloud computing is a hot topic. As people become increasingly reliant on accessing important information through the Internet, the idea of storing or displaying vital real-time data in the cloud has become more ...
This white paper describes how SNMP is applied to asset management and transportation of "shadow data," information on equipment maintenance and security within the SCADA system. Since SNMP has emerged as a very efficient vehicle for transportation of this information, it is feasible for addition...
Customers demand quick problem identification and resolution
This paper outlines a new technological development that allows the transmission of video images using low bandwidth networks for protection against sabotage and attack on our nation's critical water system infrastructure.
How Automation Improves Performance of Electric Utilities. PC-based supervisory control and data acquisition systems increase uptime, cut costs and improve utilization.
Practical Ideas for Effective Alarm Management
A number of previously unknown security vulnerabilities in the ICONICS GENESIS32 and GENESIS64 products have been publically disclosed. The release of these vulnerabilities included proof-of-concept (PoC) exploit code.</p> <p>While we are currently unaware of any malware or cyber attacks taking ...
This White Paper summarizes the currently known facts about these vulnerabilities and associated attack tools. It also provides guidance regarding a number of mitigations and compensating controls that operators of SCADA and ICS systems can take to protect critical operations.
Cloud-based SCADA as an IIoT Gateway
This White Paper shows how to acquire and store real-time process data from your automation system, SCADA, or DCS, and establish a Condition-Based Maintenance (CBM) system that optimizes preventative maintenance efforts by using the stored data to determine equipment health.