SCADA As The Heart Of a Distribution Management System
At a high level, the elements of a distribution automation system can be divided into three main areas: SCADA application and server(s) DMS applications and server(s) Trouble management applications and server(s) As was stated in the title, the Supervisory Control… Read more
Dec 25, 2012 | By Edvard Csanyi
How Stuxnet (PLC virus) spreads – Part 4
Continued from How Stuxnet (PLC virus) spreads – Part 3 » Read here Once the worm has a foothold in the Perimeter Network, it would attempt to infect any print servers and file servers it could discover. Next, the worm… Read more
Aug 18, 2011 | By Edvard Csanyi
How Stuxnet (PLC virus) spreads – Part 3
Continued from How Stuxnet (PLC virus) spreads – Part 2 » Read here Given the well-secured industrial control system described above, how could a worm like Stuxnet ever penetrate all the way to the PLCs? Yet clearly it did – Siemens… Read more
Aug 03, 2011 | By Edvard Csanyi
How Stuxnet (PLC virus) spreads – Part 2
Continued from How Stuxnet (PLC virus) spreads – Part 1 » Read here Stuxnet is a computer worm designed to infect Siemens SIMATIC WinCC and S7 PLC products, either installed as part of a PCS 7 system, or operating on… Read more
Jul 23, 2011 | By Edvard Csanyi
How Stuxnet (PLC virus) spreads – Part 1
The Stuxnet worm is a sophisticated piece of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC and PCS 7 control systems. The worm used both known and previously unknown vulnerabilities to install, infect and propagate, and… Read more
Jul 20, 2011 | By Edvard Csanyi
SCADA communication vulnerabilities
Cyber security engineering is expensive. However, the presence of vulnerabilities requires it. In this section we list vulnerabilities we typically see in SCADA systems. The order in the list of vulnerabilities does not reflect a priority in terms of likelihood… Read more
Jul 04, 2011 | By Edvard Csanyi
Wind Turbine Control and Operation with Ovation SCADA
Wind is an infinitely renewable supply of power that can be harnessed as an outstanding energy source given the proper location and use of the latest turbine generation technology. Major power producers world-wide have adopted wind power, a clean source… Read more
May 16, 2011 | By Edvard Csanyi
iFIX Scada Features
iFIX offers a robust SCADA engine, rich set of connectivity options, open architecture and highly scalable and distributed networking model. Used in a variety of applications across diverse industries, it is ideally suited for applications as simple as typical HMI… Read more
Feb 15, 2011 | By Edvard Csanyi
Security for Substation Communications
Until recently the term “security,” when applied to SCADA communication systems, meant only the process of ensuring message integrity in the face of electrical noise and other disturbances to the communications. But, in fact, “security” also has a much broader… Read more
Jan 13, 2011 | By Edvard Csanyi
SCADA Security Attacks
SCADA systems are used to control and monitor physical processes, examples of which are transmission of electricity, transportation of gas and oil in pipelines, water distribution, traffic lights, and other systems used as the basis of modern society. The security… Read more
Jan 10, 2011 | By Edvard Csanyi
Advantages Of IEC 61850
One of the significant challenges that substation engineers face is justifying substation automation investments. The positive impacts that automation has on operating costs, increased power quality, and reduced outage response are well known. But little attention is paid to how… Read more
Dec 29, 2010 | By Edvard Csanyi
