Category Archive for: «SCADA»

Page 1 of 212»

Satellite communication for remote control and monitoring of substations

Application for substation automation Substation Automation is a supervisory management and control system that lies in between transmission and distribution systems. The interests on substation automation have been increasing rapidly due to its numerous benefits to utilities. It has advanced further than a traditional Supervisory Control and Data Acquisition (SCADA) system providing additional capability and […]

Read More

Do Your Substation Devices Speak IEC 61850? They Should, It’s Time.

Overview of IEC 61850 Since being published in 2004, the IEC 61850 communication standard has gained more and more relevance in the field of substation automation. It provides an effective response to the needs of the open, deregulated energy market, which requires both reliable networks and extremely flexible technology – flexible enough to adapt to […]

Read More

Thinking About Security Considerations in SCADA Systems (2)

Continued from previous part: Thinking About Security Considerations in SCADA Systems (1) SCADA Threats In this part of technical article, I will focus on various types of threats which must be considered in order to plan the security management of a SCADA system. Some of them (first two) were described in the previous part, so […]

Read More

Thinking About Security Considerations in SCADA Systems (1)

SCADA System can be affected by a number of threats, which may be natural or intentional. So it is very much important to focus on security aspects of SCADA Systems. 1. Environmental threats SCADA equipment installed in C4ISR facilities must be of such design or otherwise protected to withstand seismic effects as well as shock […]

Read More

An Introduction To SCADA For Electrical Engineers – Beginners

Control and Supervision It is impossible to keep control and supervision on all industrial activities manually. Some automated tool is required which can control, supervise, collect data, analyses data and generate reports. A unique solution is introduced to meet all this demand is SCADA system. SCADA stands for supervisory control and data acquisition. It is […]

Read More

Three generations of SCADA system architectures

Generations SCADA systems have evolved in parallel with the growth and sophistication of modern computing technology. The following sections will provide a description of the following three generations of SCADA systems: First Generation – Monolithic Second Generation – Distributed Third Generation – Networked - Waste Water Treatment Plant – SCADA (VIDEO) 1. Monolithic SCADA Systems When SCADA systems […]

Read More

Responding to Cyber Intrusion in SCADA System

Continued from technical article: Detecting Cyber Intrusion in SCADA System The Three R’s As Response The “three R’s” of the response to cyber intrusion are: Recording, Reporting, and Restoring. Theoretically, it would be desirable to record all data communications into and out of all substation devices. In that manner, if an intruder successfully attacks the […]

Read More

Detecting Cyber Intrusion in SCADA System

How to recognize intrusion? One of the axioms of cyber security is that although it is extremely important to try to prevent intrusions into one’s systems and databases, it is essential that intrusions be detected if they do occur. An intruder who gains control of a substation computer can modify the computer code or insert […]

Read More

SCADA As Heart Of Distribution Management System

SCADA System Elements At a high level, the elements of a distribution automation system can be divided into three main areas: SCADA application and server(s) DMS applications and server(s) Trouble management applications and server(s) Distribution SCADA As was stated in the title, the Supervisory Control And Data Acquisition (SCADA) system is the heart of Distribution […]

Read More

How Stuxnet (PLC virus) spreads – Part 4

Continued from How Stuxnet (PLC virus) spreads – Part 3 » Read here Propagation to other Perimeter Network Computers Once the worm has a foothold in the Perimeter Network, it would attempt to infect any print servers and file servers it could discover. Next, the worm would identify the WinCC software installed on the Web […]

Read More
Page 1 of 212»


FOLLOW EEP!

Subscribe to Weekly Download Updates: (free electrical software, spreadsheets and EE guides)

Advertisement

EEP's Android Application
Electrical Engineering Daily Dose
Daily dose of knowledge and news from
Electrical Engineering World