DocumentCode :
2307660
Title :
Best practices in automation security
Author :
McKay, Murray
Author_Institution :
Siemens Industry, Inc
fYear :
2012
fDate :
14-17 May 2012
Firstpage :
1
Lastpage :
15
Abstract :
Historically, automation systems have relied on "security through obscurity" to avoid computer attacks. Those days are gone. While the number of actual attacks on automation systems has been small, the tools needed to conduct these attacks are now loose in the "wild", and the potential losses from an attack are large. Requirements for MIS and MES integration with the control system, as well as program backup and maintenance activities eliminate the possibility of security through lack of connectivity. With careful system design and security-aware practices, security risks can be controlled. Network design complying with the ISA-99 recommendations places barriers between external threats and your control system. Proper configuration of security options on control system equipment can erect further barriers to attacks. Creation of, and adherence to operating policies can limit threats from non-network sources.
Keywords :
control engineering computing; risk analysis; security of data; ISA-99 recommendations; MES; MIS; automation security; automation systems; best practices; computer attacks; control system equipment; maintenance activities; program backup; security options; security risks; security-aware practices; system design;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cement Industry Technical Conference, 2012 IEEE-IAS/PCA 53rd
Conference_Location :
San Antonio, TX
ISSN :
2155-9139
Print_ISBN :
978-1-4673-0284-5
Type :
conf
DOI :
10.1109/CITCON.2012.6215678
Filename :
6215678
Link To Document :
بازگشت