Human Machine Interface (HMI) has evolved significantly from the days in which operations staff had to sit in front of a single screen to monitor a machine or a process. HMI/SCADA (Supervisory Control and Data Acquisition) applications now not only monitor and help control equipment and processes but also provide a huge range of information [...]
Tag Archives | SCADA
Automation Week 2012 Asset Performance Track: Systems Presenter: Graham Nasby, Eramosa Engineering From an owner’s perspective, selecting automation technology for any process or plant represents a myriad of choices. These choices range from large-scale choices such selecting the automation platform (i.e., whether to use a DCS, a collection of PLCs/RTUs, vendor package control systems, or a [...]
1. Which is of the following is NOT an element of the ISA99.00.02 – Selected Security Counter Measures group? 2. “Countermeasures” in cyber security are measures taken to: 3. Why would a company issue security policies for industrial networks? 4. A key factor for the success of a cyber security program is: What are [...]
Once a hacker has gained access to a moderately secured network, they can easily determine the IP addresses of every device on the network. Using port scans, they then can determine if the device communicates through HTTP, SNMP, Telnet, MODBUS, etc. Once the communications protocol has been established, the hacker will first attempt to determine [...]
1. Most of the new and most dangerous hacking activity today is being driven by: 2. Which three basic properties are the building blocks of cyber security? 3. What is the biggest security problem if business networks connect directly to manufacturing control systems? 4. If a denial of service attack shuts down an industrial network, [...]
The Stuxnet worm is a sophisticated piece of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC and PCS 7 control systems. The worm used both known and previously unknown vulnerabilities to install, infect and propagate, and was powerful enough to evade state-of-the-practice security technologies and procedures. Since its discovery, there has [...]
The need for standardization led the City of Guelph’s Water Services department in Canada to embark on a multi-year program to modernize and enhance its Supervisory Control and Data Acquisition (SCADA) system using a standards-based approach. Starting with a comprehensive SCADA Master Plan, the city developed a set of SCADA standardization documents that were incorporated [...]
Automation Made Easy: Everything You Wanted to Know about Automation and Need to Ask by Peter G. Martin, Ph.D., and Gregory Hale provides a basic, functional understanding of industrial automation along with critical insights into essential terminology, new and leading technologies, and proper system application.
The move to using open standards such as Ethernet, TCP/IP and web technologies in SCADA and process control networks has begun to expose these systems to the same cyber attacks that have wrecked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA99 standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.
Wireless systems and wireless technologies have advanced to the point where stable, robust and secure networks are ready for deployment in industrial settings. This course will cover the most relevant details associated with industrial wireless systems with an emphasis towards how the various technological choices coexist, interoperate and interact with each other. Numerous examples of real-world deployments are covered for facilities such as SCADA systems, petrochemical plants, electrical power generation, and transmission systems.