[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Horch, 2018 - Google Patents

Bringing safety and security together for process control applications: It is important to understand the interaction between safety and security in process control …

Horch, 2018

Document ID
14297955314908148266
Author
Horch A
Publication year
Publication venue
Control Engineering

External Links

Snippet

Every production process comes with inherent risks. To achieve the greatest degree of safety and security, it is vital to implement an effective separation of the process control and safety systems, which is required for functional safety and cybersecurity standards. There is …
Continue reading at go.gale.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/18Packaging or power distribution
    • G06F1/181Enclosures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting

Similar Documents

Publication Publication Date Title
Horch Bringing safety and security together for process control applications: It is important to understand the interaction between safety and security in process control applications to make better overall decisions
Kruger et al. A new approach to IT security: information object-level controls have the potential to better protect hospitals from data breaches by building security controls into the information itself
Latini Six answers on industrial cybersecurity effectiveness: Industrial automation cybersecurity has a lot of confusion and questions. Learn about changing trends and effective best practices for operations technology (OT) providers.
Mandachit et al. Eight ICS cybersecurity tips for a hyper-connected world: Implementing a cybersecurity strategy against internal and external threats are key steps toward securing an industrial control system (ICS)
Price How to improve cybersecurity: The rise of Industry 4.0 means there are greater cybersecurity risks for manufacturers and engineering.
Summers Safety controls, alarms, and interlocks as IPLs
Heires Preparing for the internet of things: smart devices present new security challenges
Diaz et al. SIS cybersecurity: Choosing a safety instrumented system (SIS) architecture for defensible operation across the product lifecycle is one of the first decisions an organization must make; know these applicable standards
Adkar Integrated controls boost ROI: Programmable logic controllers (PLCs) combining integration, cybersecurity, and OPC UA bring greater productivity and reliability
Mustard Operational Technology Cybersecurity--What Every Operator Needs to Know
Bouhdada Six best practices for implementing and securing IIoT products: The practice of" securing by design" can help companies protect against potential cyberattacks on Industrial Internet of Things (IIoT) products
Kronz PtD: First defense against control panel electrical hazards: Prevention through design (PtD) can help manufacturers keep workers safe from electrical hazards, which remains one of the most common dangers they face daily. Do you use the five-point hierarchy of risk?
Henderson Six steps to improve computer hardening: Computer hardening helps make systems resistant to cybersecurity attacks. Six tips are highlighted to help engineers respond.
Vavra The need for critical infrastructure specialists: specialized experts for specific critical infrastructure projects are becoming more common as projects become more complex and more demanding
Shores Cybersecurity demands coordinated tactics: Securing operational technology (OT) networks for resiliency against cyberattacks requires coordination between information technology (IT) and OT personnel, and recognition of the differences between the two domains.
Hoske Process controls: More with less: Process controls and instrumentation need to be more intuitive with more integrated intelligence, and they are, out of necessity, because of retiring talent with too few replacements
Zollner Ensure software updates protect motion control: Product safety and operational safety of elevators require that software updates are under control. Standards help lower motion-control application risks.
Gruhn How to keep process facilities safe: proper safety management can be taken to minimize risk
Erby Five ways automation helps manufacturers during COVID-19: During COVID-19, protect people and minimize manufacturing interruptions with virtual site visits, a team approach, remote visualization, a backup control room and offsite capabilities.
Wagman Here comes cyber security.
Cusimano Safety requires cybersecurity: if it isn't secure, it isn't safe. Cybersecurity vulnerabilities represent additional failure modes and safety incidents not factored into traditional safety assessments. Consider safety when creating a business justification for cybersecurity risk assessments
Gold et al. Treat security like safety
Romanow Challenges for process data and control systems
Buecker A 5-step approach to IIoT success: successful deployment starts with assessment of systems, operation
Hoske Advice from cybersecurity incident: Cybersecurity incident: Human errors enabled it, but the Triconex safety controller shut down the plant as designed, say experts with Schneider Electric and ARC Advisory Group. But it's still a call to action for industry. Have you implemented changes since then?