Horch, 2018 - Google Patents
Bringing safety and security together for process control applications: It is important to understand the interaction between safety and security in process control …Horch, 2018
- Document ID
- 14297955314908148266
- Author
- Horch A
- Publication year
- Publication venue
- Control Engineering
External Links
Snippet
Every production process comes with inherent risks. To achieve the greatest degree of safety and security, it is vital to implement an effective separation of the process control and safety systems, which is required for functional safety and cybersecurity standards. There is …
- 238000004886 process control 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/18—Packaging or power distribution
- G06F1/181—Enclosures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Horch | Bringing safety and security together for process control applications: It is important to understand the interaction between safety and security in process control applications to make better overall decisions | |
Kruger et al. | A new approach to IT security: information object-level controls have the potential to better protect hospitals from data breaches by building security controls into the information itself | |
Latini | Six answers on industrial cybersecurity effectiveness: Industrial automation cybersecurity has a lot of confusion and questions. Learn about changing trends and effective best practices for operations technology (OT) providers. | |
Mandachit et al. | Eight ICS cybersecurity tips for a hyper-connected world: Implementing a cybersecurity strategy against internal and external threats are key steps toward securing an industrial control system (ICS) | |
Price | How to improve cybersecurity: The rise of Industry 4.0 means there are greater cybersecurity risks for manufacturers and engineering. | |
Summers | Safety controls, alarms, and interlocks as IPLs | |
Heires | Preparing for the internet of things: smart devices present new security challenges | |
Diaz et al. | SIS cybersecurity: Choosing a safety instrumented system (SIS) architecture for defensible operation across the product lifecycle is one of the first decisions an organization must make; know these applicable standards | |
Adkar | Integrated controls boost ROI: Programmable logic controllers (PLCs) combining integration, cybersecurity, and OPC UA bring greater productivity and reliability | |
Mustard | Operational Technology Cybersecurity--What Every Operator Needs to Know | |
Bouhdada | Six best practices for implementing and securing IIoT products: The practice of" securing by design" can help companies protect against potential cyberattacks on Industrial Internet of Things (IIoT) products | |
Kronz | PtD: First defense against control panel electrical hazards: Prevention through design (PtD) can help manufacturers keep workers safe from electrical hazards, which remains one of the most common dangers they face daily. Do you use the five-point hierarchy of risk? | |
Henderson | Six steps to improve computer hardening: Computer hardening helps make systems resistant to cybersecurity attacks. Six tips are highlighted to help engineers respond. | |
Vavra | The need for critical infrastructure specialists: specialized experts for specific critical infrastructure projects are becoming more common as projects become more complex and more demanding | |
Shores | Cybersecurity demands coordinated tactics: Securing operational technology (OT) networks for resiliency against cyberattacks requires coordination between information technology (IT) and OT personnel, and recognition of the differences between the two domains. | |
Hoske | Process controls: More with less: Process controls and instrumentation need to be more intuitive with more integrated intelligence, and they are, out of necessity, because of retiring talent with too few replacements | |
Zollner | Ensure software updates protect motion control: Product safety and operational safety of elevators require that software updates are under control. Standards help lower motion-control application risks. | |
Gruhn | How to keep process facilities safe: proper safety management can be taken to minimize risk | |
Erby | Five ways automation helps manufacturers during COVID-19: During COVID-19, protect people and minimize manufacturing interruptions with virtual site visits, a team approach, remote visualization, a backup control room and offsite capabilities. | |
Wagman | Here comes cyber security. | |
Cusimano | Safety requires cybersecurity: if it isn't secure, it isn't safe. Cybersecurity vulnerabilities represent additional failure modes and safety incidents not factored into traditional safety assessments. Consider safety when creating a business justification for cybersecurity risk assessments | |
Gold et al. | Treat security like safety | |
Romanow | Challenges for process data and control systems | |
Buecker | A 5-step approach to IIoT success: successful deployment starts with assessment of systems, operation | |
Hoske | Advice from cybersecurity incident: Cybersecurity incident: Human errors enabled it, but the Triconex safety controller shut down the plant as designed, say experts with Schneider Electric and ARC Advisory Group. But it's still a call to action for industry. Have you implemented changes since then? |