Security for critical infrastructure SCADA systems
This "special to the web" White Paper provides a non-technical overview of critical infrastructure SCADA security and gives a background on
SCADA systems and the history of critical infrastructure concern.
The six dumbest ideas in computer security
Marcus Ranum suggests that these dumb ideas are the fundamental reasons why all that money you spend on information security is going to be
wasted, unless you somehow manage to avoid them.
Control systems under attack: Part 3
Hacking into public utility systems isn't a new problem, nor is it limited to power systems. There have been documented cases going back
more than a decade that involve sewer, water, air traffic, and power
systems. (Third of three parts.)
Cyber security for the electric sector
It's hard to find an industry that doesn't rely on computers and networks. This article addresses the compliance cost of NERC attack prevention
standards in the electric power distribution industry and just how little
work gets done in a typical plant when the network is down.
Keep your wireless business secure
Wireless technologies create security vulnerabilities that can threaten your manufacturing network, but a simple plan can protect the enterprise.
Find out why security continues to be a top priority in the process
industries and how wireless technology can be easy to use if you build
security in from the beginning.
System security: Protect your intellectual assets
Manufacturing automation system security is more than using anti-virus software. It's an essential business strategy to protect your intellectual
property — and your competitive advantage. Find out what the Top Security
Defenses are and how you can implement them at your plant.
At the Honeywell User Group (HUG) Peter Zornio announced that Honeywell's new controller series had passed the BCIT (British Columbia Institute of
Technology) cybersecurity testing, saying that it had been the only one
with a passing grade.
Network monitoring system to detect unwanted wireless networks
The Linux-based wireless intrusion detection system is aimed at stopping a network's security from being compromised by detecting the installation
of unauthorized access points.
HMI maintenance program protects against cybersecurity threats to power plants
Going into effect later this year and in 2006, NERC and ENISA have outlined stringent guidelines that require power plants to adopt virus and security precautions.