Security

on 'Security'

1-20 of 26 < first | prev | | last >
  • Application of Fingerprints to Increase Security

    This 9-page paper summarizes the various applications and benefits of the use of fingerprints to restrict access to information and transactions. It covers access via the Internet and other networks as well as physical access.

    10/15/2004
  • Security Vulnerability Analysis

    Plant security is a key priority at many plants. This 10-page paper provides background what the methodology for a plant vulnerability analysis involves. It covers topics such as how to get started, available tools, and risk assessment.

    12/02/2004
  • Control System Security: Interacting with IT

    Operations staff and plant engineers also have a keen interest in the security of control networks. They are responsible for the reliability, availability, safety and integrity of the process. Their facilities are the ones producing products and earning revenues, so their concerns, priorities and knowledge must also be considered when determining security options.

    10/15/2004
  • RFID in Manufacturing

    In the wake of a Wal-Mart mandate requiring top suppliers to put Radio Frequency Indentification (RFID) tags on cases and pallets of consumer goods by January 2005, Rockwell Automation offers this white paper to help educate manufacturers on how to maximize their investment in RFID technology throughout their enterprise and supply chains. The paper provides a practical guide to extracting measurable value from RFID implementations in plant and warehousing operations.

    10/21/2004
  • Process Safety Symposium – Making Safety Second Nature

    This 10-page document discusses how the reference from the Center for Chemical Process Safety -- "Inherently Safer Chemical Processes, A Life Cycle Approach," 1st Edition, 1996 -- was updated in 2007. Inherent Safety has been well received by industry, but there has been significant advancement in the concept of inherently safer design over the last 10 years. This overview highlights lessons learned and best practices in inherent safety.

    01/11/2010
  • Chemical Processing Special Report: Secure plan(t)

    In the decade before Stuxnet attacked process control systems in Iran, there were just five known supervisory control and data acquisition (SCADA) vulnerabilities for all control systems in the world, according to the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). In 2011, the year after Stuxnet, that vulnerability count jumped to more than 215. Last year, it reached 248 (Figure 1). No surprise then that Chemical makers are increasingly focusing on protecting their process control systems from intrusion both from the inside and outside. In this Chemical Processing Special Report: Secure plan(t), we take a look at:
    • How to better protect your control system - “Defense in depth” is crucial, and new and maturing technologies may help
    • Cyber Security Challenges – learn about countermeasures to protect control systems
    • Case Study: A vulnerability assessment reveals critical gaps in the security of a natural gas pipeline
    • How to mitigate security risks in legacy process control systems - several steps can help protect against threats and extend the life of legacy equipment
    Learn how to secure your process control systems – and your plant. Download your copy of this Chemical Processing Special Report: Secure plan(t) now.

    12/17/2013
  • Methods of determining safety integrity level (SIL)

    This 17-page whitepaper discusses the application of two popular methods of determining SIL requirements – risk graph methods and layer of protection analysis (LOPA) – to process industry installations.

    4-sight consulting
    04/19/2005
  • Understanding alarm management

    This nine-page PDF whitepaper discusses the pitfalls of alarm management and how mistakes in the past have been quite costly. It then addresses these mistakes and gives an overview of proper alarm management.

    4-sight Consulting
    02/10/2005
  • IT Security for Process Control Using Siemens SIMATIC PCS 7

    Ensuring the security of industrial control systems is hardly a new topic. The earliest users of modern control systems in power stations and chemical plants saw the need to protect access to vital control functions from unauthorized use. Similarly, in industries such as fine chemical or pharmaceutical where “the process is the product”, manufacturers have always sought to protect the secrets of their unique processes from the prying eyes of industrial spies. This white paper by ARC describes how the Siemens AG PCS7 Security Concept bundles key security measures in seveal specific areas to create a deep hierarchy of security known as “defense in depth”.

    ARC Advisory Group
    02/25/2008
  • Layered Security in Plant Control Environments

    Process control vendors are migrating plant control technologies to more open network and operating environments. This White Paper explains how layered security can be accomplished by adopting a "best practices" model, developing and implementing an access control plan, and compartmentalizing the network.

    Ensuren Corp.
    10/15/2004
  • Securing Process Control Network External Communications

    In the real world, sharing PCN data with external systems and accessing PCN systems from external sources is fast becoming a business necessity. This paper provides some generic guidelines for enabling secure connectivity between PCNs and external systems.

    Honeywell
    09/16/2005
  • No More Risky Business With Virtual Patching

    Patching process control system software to remove security vulnerabilities is fraught with risk. System issues can be the result of installing a patch, but a system is also vulnerable without patching. Fortunately, virtual patching can improve the process and raise the system’s security at the same time.

    Honeywell
    09/21/2012
  • Cyber Security: A Perfect Storm

    As companies and industries increasingly rely on technology, security risks become greater. With growing numbers of Windows machines and increased scarcity of skilled technical resources, a “perfect storm” of cyber threats in production facilities is looming.

    Honeywell
    09/21/2012
  • Application Whitelisting: Extend Your Security Arsenal

    As the security threat landscape continues to evolve, so must your response. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, application whitelisting can be an important addition to your security arsenal.

    Honeywell
    09/21/2012
  • Chemical Processing Special Report: Cyber Security

    The technology advances in control systems and open systems have afforded us improved efficiency, productivity and the ability to advance our operations. However, these improved technology advances have also come with risks that threaten these efficiencies. Viruses; an increased dependency on uptime, availability and reliability; operator errors and increased regulations are just some of the threats today's manufacturers need to contend with when managing their operations. In this Putman Media Special Report, we take a look at the cyber security issues today's manufacturers need to contend with; identify control systems vulnerabilities and offer a three-step approach for building better cyber security at your operations.

    Honeywell Process Solutions
    02/09/2012
  • Process Control Network Security - Reference Architecture

    This document describes best practices for the reference architecture for a process control system network and its interfaces to a corporate network. The paper’s objective is to give the reader an understanding of the techniques utilized to securely connect these networks.

    Invensys
    01/11/2006
  • Process Control Network Security

    This document provides an understanding of intrusion detection and prevention systems, why they are necessary, how and where they fit in the control system environment, and gives example scenarios.

    Invensys
    03/27/2006
  • Security vulnerability assessment revealed

    Plant security is a key priority at many plants. This 10-page paper provides background what the methodology for a plant vulnerability analysis involves. It covers topics such as how to get started, available tools, and risk assessment.

    ioMosiac
    04/21/2005
1-20 of 26 < first | prev | | last >