How Stuxnet (PLC virus) spreads – Part 4
Continued from How Stuxnet (PLC virus) spreads – Part 3 » Read here Once the worm has a foothold in the Perimeter Network, it would attempt to infect any print… Read more
Aug 18, 2011 | By Edvard Csanyi
How Stuxnet (PLC virus) spreads – Part 3
Continued from How Stuxnet (PLC virus) spreads – Part 2 » Read here Given the well-secured industrial control system described above, how could a worm like Stuxnet ever penetrate all the… Read more
Aug 03, 2011 | By Edvard Csanyi
How Stuxnet (PLC virus) spreads – Part 2
Continued from How Stuxnet (PLC virus) spreads – Part 1 » Read here Stuxnet is a computer worm designed to infect Siemens SIMATIC WinCC and S7 PLC products, either installed… Read more
Jul 23, 2011 | By Edvard Csanyi
How Stuxnet (PLC virus) spreads – Part 1
The Stuxnet worm is a sophisticated piece of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC and PCS 7 control systems. The worm used both known… Read more
Jul 20, 2011 | By Edvard Csanyi
SCADA communication vulnerabilities
Cyber security engineering is expensive. However, the presence of vulnerabilities requires it. In this section we list vulnerabilities we typically see in SCADA systems. The order in the list of… Read more
Jul 04, 2011 | By Edvard Csanyi
Wind Turbine Control and Operation with Ovation SCADA
Wind is an infinitely renewable supply of power that can be harnessed as an outstanding energy source given the proper location and use of the latest turbine generation technology. Major… Read more
May 16, 2011 | By Edvard Csanyi
iFIX Scada Features
iFIX offers a robust SCADA engine, rich set of connectivity options, open architecture and highly scalable and distributed networking model. Used in a variety of applications across diverse industries, it… Read more
Feb 15, 2011 | By Edvard Csanyi
Security for Substation Communications
Until recently the term “security,” when applied to SCADA communication systems, meant only the process of ensuring message integrity in the face of electrical noise and other disturbances to the… Read more
Jan 13, 2011 | By Edvard Csanyi
SCADA Security Attacks
SCADA systems are used to control and monitor physical processes, examples of which are transmission of electricity, transportation of gas and oil in pipelines, water distribution, traffic lights, and other… Read more
Jan 10, 2011 | By Edvard Csanyi
Advantages Of IEC 61850
One of the significant challenges that substation engineers face is justifying substation automation investments. The positive impacts that automation has on operating costs, increased power quality, and reduced outage response… Read more
Dec 29, 2010 | By Edvard Csanyi