Dear saakj: To receive the latest automation information, add enews@automation.com to your address book. Read the online version if links don't work in this Security Update. | | | August 2009 | Sponsor: Honeywell | Security for Industrial Plants from Honeywell Process Solutions  As a global leader in both security and process control technology and as an operator of our own chemical plants, Honeywell Process Solutions is uniquely qualified to provide security for industrial plants. Our innovative solutions can be scaled for sites of all sizes, adapted to different risk levels and seamlessly integrated with process control and building controls. And most importantly, protect your plant and employees, help you meet regulatory requirements and keep your surrounding community safe. Visit our website for more information | Sponsor: Longwatch | Longwatch Version 5.0  Seeing the complete picture gives the most valuable information. Reduce false alarms, deter crime, improve safety and security, increase regulatory compliance for ALL your plant assets, local AND remote, with Longwatch Version 5.0. Click here for more information | Visit our Automation Portals | Our Automation Portals organize information on various topics and include content published on Automation.com as well as other industry websites. Each portal includes new products, company news, articles, white papers, application stories, training, resources, events, and more. Visit these one-stop sites for all your automation information | | In this Issue | | Featured Articles | PC Access Could Invite Hackers Control Design, July 2009 By Dan Hebert One major concern for many machine builders and their customers is holding PC implementation back, namely the lack of security inherent to most PC platforms when they are connected to the outside world. Secure Embedded Wireless—Part II Industrial Networking, July 2009 By Ned Lecky, Lecky Integration The previous column explained how to go wireless, but the trick is ensuring security and creating adequate redundancy. Addressing SIS Cyber Security; Is it First or Last? Control Engineering, July 2009 By Bob Huba and Chuck Miller, Emerson Process Management Part 2: When considering integrated control and safety systems, building a strong defense is an investment in ensuring business continuity. How should you implement the concepts? Securing Legacy Control Systems Control Engineering, July 2009 By Peter Welander Very few of the process control platforms operating today were installed with any cyber security protection built in. Most predate wide deployment of the Internet. Can these systems be protected against today’s threats? Securing integrated Scada systems against cyber attacks European Chemical Engineer, June 2009 By Paul Hurst, Citect UK Failure to protect a plant's Scada system from the threat of cyber attack can have big security implications.
| Browse more articles and white papers on the Security portal. | Live News Feed | | | Product Announcements | | Other Product Announcements | Browse more Product Announcements on the Security portal. Search all Products by keyword, category, manufacturer or release date. | White Papers | Video Monitoring Helps in Tough Economic Times By Steve Rubin, Longwatch Video monitoring can help companies survive through layoffs, plant closings, and idling of plants. The white paper explains that when plants have layoffs or shut down, much work remains to be done, often by a severely reduced workforce. Video can help pick up the workload. Maritime Security: Meeting Threats to the Offshore Oil and Gas Industry By Honeywell Process Solutions A major issue for worldwide energy companies is securing offshore oil and gas platforms. This paper covers the challenges faced by the oil & gas industry in securing offshore production assets, including key requirements for an effective platform security strategy, and the latest technology enabling an integrated security management system. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems By GE Fanuc NERC’s standards for Critical Infrastructure Protection (CIP) apply to various critical assets, and this paper demonstrates how Change Control principles can help protect two specific asset types: SCADA and control systems. Creating Secure OPC Architectures By Adriel Michaud, MatrikonOPC Technical guide on how to secure typical OPC implementations. It covers OPC DA, HDA, and A&E, securing OPC Servers from unauthorized OPC Client access, and restricting authorized OPC Clients to only the functions necessary. Hacking the Industrial Network By Innominate Security Technologies While many engineers believe that their production networks are isolated from outside access, nothing could be further from the truth. It is common practice to include access to Web-based services on most programmable logic controllers. This report identifies incidents involving major corporations, utilities, nuclear plants and the Pentagon. A table of twenty-nine major incidents is provided, some of which were kept secret for years. Detailed footnotes and clickable internet research links are provided to document these incidents and each statement of fact.
| Browse more white papers on the Security portal. | Application Stories | ABB selects IVC camera system for Guri Dam Project Process & Control Today, June 2009 ABB has implemented IVC cameras and camera management software in the Guri Dam protection system. The second largest dam in the world, the Guri hydroelectric plant provides most of Venezuela’s hydroelectric power.
| Browse more application stories on the Security portal. | Company & Organizational News | Telvent integrates with Longwatch video surveillance system Telvent integrated the Longwatch Surveillance System with its OASyS DNA SCADA system. This lets oil, gas, electric, and water network operators monitor video via an OASyS SCADA system. Wurldtech certifies Invensys I/A FCP 270 The FCP 270 is the third system from Invensys to meet the Level 1 criteria. HIMA HIMax System receives security certification The HIMAx safety system received security certification by Wurldtech Security Technologies. ISA99 plans Working Group on cyber security and safety ISA99 Working Group 7 will promote greater awareness of the impact of cyber security issues on the safe operation of industrial processes.
| Browse more company and organizational news on the Security portal. | Project News | ISaGRAF supplies software to CSE-Semaphore ISaGRAF software will be used in CSE-Semaphore’s Kingfisher series of Advanced RTUs, which are now available with Secure DNP3 Authentication.
| Browse more project news on the Security portal. | Featured Events | Emerson User Exchange September 28-October 2, 2009 Orlando, Florida Emerson Global Users Exchange is more than an industry-leading technical conference…it is a community of manufacturing leaders committed to extracting the most from their automation investment…and sharing their learning with each other. ISA EXPO 2009 October 6-10, 2009 Houston, Texas ISA EXPO is focused on the technology and techniques of automation and control. Organized around the six core themes central to automation and control, ISA EXPO 2009 provides attendees unlimited opportunity to explore key technologies, discover professional growth, and interact with like minded professionals. Remote 2009 Conference & Expo October 29-30, 2009 San Antonio, Texas Remote 2009 Conference and Expo will focus on the leading advancements for the monitoring and management of distributed equipment and facilities, remote assets, automated process & system controls and device networks. Hannover Messe Middle East February 9-11, 2010 Dubai Deutsche Messe Hannover will be staging CeMAT Middle East, Industrial Automation (IA) Middle East, and Motion, Drive & Automation (MDA) Middle East together.
| Browse more industry events on the Security portal. Add an event to our calendar. | I hope you enjoyed this Security update. If you have any comments or suggestions regarding the content in this e-newsletter or on Automation.com, please don't hesitate to contact me. Rick Zabel Vice President, Publisher Automation.com View our Privacy Policy For editorial inquiries, please contact Rick Zabel For advertising inquiries, please contact Karen Olson or Kia Weller, or see our Media Kit. | |
|
Hiç yorum yok:
Yorum Gönder