industrial automation control

Could Cyber Terrorists Attack Our Company?

Article in:  ControlGlobal, June 2010

The majority of control system cyber threats are unintentional, as discussed in this article that summarizes data from the Repository of Industrial Security Incidents (RISI).  Tips on how to start reducing the risk of cyber threats are provided.

Could Cyber Terrorists Attack Our Company?

TOP 5 IN 2010: Automation technologies to watch for

Automationmag.com asked five industry experts to name the top five technologies and trends that will impact Canadian and worldwide manufacturers in 2010 and beyond.

Cyber security for pipeline control systems

Article in: Pipeline & Gas Journal, February 2009

Eric Byres, CTO of Tofino Security, has published an article about cyber security and pipeline control systems in Pipeline and Gas Journal.....

CYBER SECURITY AND THE PIPELINE CONTROL SYSTEM

Forget the Silos, Build the Bridge

Article in: InTech Magazine, December 2007

Over the past 10 years, the industrial controls (IC) world has borrowed substantially from the world of information technologies (IT)...

Eric Byres, Jim Bauhs, and Brian Mason; "Forget the Silos, Build the Bridge", InTech Magazine, December 2007

OPC Security White Paper #2 - OPC Exposed

Abstract: In this second White Paper of the OPC  Security Series, we describe the vulnerabilities typically found in OPC hosts, based on OPC’s current architecture and the typical underlying operating system. We also investigate common misconfiguration vulnerabilities found in OPC server or client computers both at the operating system and OPC application level. Finally, using these vulnerabilities we propose four possible risk scenarios for OPC-based attacks.

The Special Needs of SCADA/PCN Firewalls: Architectures and Test Results

E.J. Byres, B. Chauvin, D. Hoffman, J. Karsch and N. Kube; “The Special Needs of SCADA/PCN Firewalls: Architectures and Test Results”, The 11th IEEE International Conference on Emerging Technologies and Factory Automation, Institute of Electrical and Electronics Engineers, Catania Italy, September 2005

Why we need Security Audits

Article in: InTech Magazine, March 2005
 
Corporations and PCN vendors are incapable of taking action to improve the security posture of the current or future process environments without specific solution requirements. Just saying "we need firewalls and encrypted SCADA protocols" is not enough.

The Myths and Facts behind Cyber Security Risks for Industrial Control Systems

E.J. Byres and J. Lowe; “The Myths and Facts behind Cyber Security Risks for Industrial Control Systems”, VDE 2004 Congress, VDE, Berlin, October 2004

Subscribe to RSS - industrial automation control