This issue of SecureSystems Insider can be viewed on the web at:
http://www.putman.net/newsletter/ssi/05/050920.html
 
SecureSystems Insider - Latest developments in process automation platforms
THIS EDITION
SPONSORED BY

Honeywell
Honeywell - Protect your process control network from cyberthreats

 
September 20, 2005—In This Issue

 
Security for critical infrastructure SCADA systems
The six dumbest ideas in computer security
Control systems under attack: Part 3
Cyber security for the electric sector
Keep your wireless business secure
System security: Protect your intellectual assets
Security unconscious?
Network monitoring system to detect unwanted wireless networks
HMI maintenance program protects against cybersecurity threats to power plants
 

 
 
Security for critical infrastructure SCADA systems
ControlGlobal.com
This "special to the web" White Paper provides a non-technical overview of critical infrastructure SCADA security and gives a background on SCADA systems and the history of critical infrastructure concern.

The six dumbest ideas in computer security
Ranum.com
Marcus Ranum suggests that these dumb ideas are the fundamental reasons why all that money you spend on information security is going to be wasted, unless you somehow manage to avoid them.

Control systems under attack: Part 3
RedHerring.com
Hacking into public utility systems isn't a new problem, nor is it limited to power systems. There have been documented cases going back more than a decade that involve sewer, water, air traffic, and power systems. (Third of three parts.)

Cyber security for the electric sector
ControlGlobal.com
It's hard to find an industry that doesn't rely on computers and networks. This article addresses the compliance cost of NERC attack prevention standards in the electric power distribution industry and just how little work gets done in a typical plant when the network is down.

Keep your wireless business secure
ControlGlobal.com
Wireless technologies create security vulnerabilities that can threaten your manufacturing network, but a simple plan can protect the enterprise. Find out why security continues to be a top priority in the process industries and how wireless technology can be easy to use if you build security in from the beginning.

System security: Protect your intellectual assets
ControlGlobal.com
Manufacturing automation system security is more than using anti-virus software. It's an essential business strategy to protect your intellectual property — and your competitive advantage. Find out what the Top Security Defenses are and how you can implement them at your plant.

Security unconscious?
ControlGlobal.com
At the Honeywell User Group (HUG) Peter Zornio announced that Honeywell's new controller series had passed the BCIT (British Columbia Institute of Technology) cybersecurity testing, saying that it had been the only one with a passing grade.

Network monitoring system to detect unwanted wireless networks
ControlGlobal.com
The Linux-based wireless intrusion detection system is aimed at stopping a network's security from being compromised by detecting the installation of unauthorized access points.

HMI maintenance program protects against cybersecurity threats to power plants
ControlGlobal.com
Going into effect later this year and in 2006, NERC and ENISA have outlined stringent guidelines that require power plants to adopt virus and security precautions.
 
 



Subscribe to free ControlGlobal.com White Paper Alerts


Subscribe to SecureSystems Insider

 
CONTACT US
We welcome your editorial comments and suggestions. Please send these by e-mail to the Editor in Chief of CONTROL magazine, Walt Boyes, at wboyes@putman.net.
 
Technical questions and customer support issues can be sent to support@putman.net.
 


Putman Media Inc.
555 West Pierce, Suite 301, Itasca, IL 60143
630-467-1300

© 2005 Putman Media. The content of this message is protected by copyright and trademark laws under U.S. and international law. All rights reserved.