ISA Report on Security Submitted to ANSI

Oct. 3, 2007
ISA-tr99.00.01, Security Technologies for Industrial Automation and Control Systems, has been submitted to ANSI for approval as an ANSI Technical Report.

The need to protect industrial automation and control system (IACS) computer environments from malicious cyber intrusions has grown significantly over the past decade. The combination of the increased use of open systems, platforms, and protocols in the IACS environment, along with an increase in joint ventures, alliance partners, and outsourcing, has led to increased threats and a higher probability of cyber attacks, according to ISA. As these threats and vulnerabilities increase, the risk of a cyber attack on an industrial communication network correspondingly increases, as well as the need for the protection of computer and network-based information sharing and analysis centers.

Additionally, the growth in intelligent equipment and embedded systems, increased connectivity to computer and networked equipment and software, and enhanced external connectivity coupled with rapidly increasing incidents of network intrusion, more intelligent hackers, and malicious yet easily accessible software, all add to the risk, according to the report.

There are numerous electronic security technologies and cyber intrusion countermeasures potentially available to the IACS environment. The Security Technologies for Industrial Automation and Control Systems Technical Report introduces several categories of cyber security technologies and countermeasure techniques and discusses specific types of applications within each category, the vulnerabilities addressed by each type, suggestions for their deployment, and their known strengths and weaknesses. Additionally, guidance is provided for using the various categories of security technologies and countermeasure techniques for mitigation of the above-mentioned increased risks.

The document does not make recommendations of one cyber security technology or mitigation method, but provides guidance for using the technologies and methods, as well as information to consider when developing a site or corporate cyber security policy, program and procedures for the IACS environment. For more information, visit www.isa.org/standards.

Mergers, Alliances, and Acquisitions

Dalsa's IPD Vision Appliance products have been approved for participation in the Rockwell Automation Encompass Program.

International Motion Control, (IMC) of Buffalo, N.Y., has signed a purchase agreement with the ITT Corp., which will make it part of ITT’s Motion & Flow Control Division.

MooreHawke, a division of Moore Industries-International, and Emerson Process Management have signed an alliance agreement to co-market MooreHawke fieldbus interface solutions through Emerson’s worldwide sales network.

1997-2007 Flashback

  • OCT. 2, 2002—A man is shot and killed in a grocery store parking lot in Wheaton, Md., the first victim in a series of sniper attacks in the Washington, D.C.
  • OCT. 4, 2004—The SpaceShipOne rocket plane breaks through Earth’s atmosphere for the second time in five days to capture a $10 million prize aimed at opening space to tourists.
  • OCT. 7, 1999—American Home Products Corp. agrees to pay up to $4.83 billion to settle claims that the fen-phen diet drug combination caused dangerous heart valve problems.
  • OCT. 15, 2003—China launches its first manned space mission, becoming the third country to send a person into orbit.
  • OCT. 17, 1997—The remains of revolutionary Ernesto ‘’Che’’ Guevara are laid to rest in his adopted Cuba, 30 years after his execution in Bolivia.
  • OCT. 24, 2003—The era of supersonic jet travel comes to an end as three British Airways Concordes land at London’s Heathrow Airport.
  • OCT. 29, 1998—John Glenn, the first American to orbit the earth, returns to space at age 77.
  • OCT. 31, 2001—Microsoft and the Justice Department reach a tentative agreement to settle their historic antitrust case.

Sponsored Recommendations

Enhancing HMI Security and Accessibility with Cloud VPN Solutions

Enhance HMI security and remote access with Beijer’s cloud VPN solution. Enjoy advanced encryption, easy setup, and secure access via laptops, smartphones, or tablets. Cut costs...

Motor Encoders: What They Are and How They Work

Motor encoders are rotary encoders adapted to provide information about an electric motor shaft's speed and/or position. Like rotary encoders, motor encoders are most commonly...

C-Face Solutions for Motor Feedback

EPC's C-face encoders use an internal flex mount that accommodates shaft run-out while maintaining alignment.

Selecting Digital Encoder Outputs

Closed-loop feedback is where the encoder signals control the motor without any user inputs. Open loop feedback is where the encoder signal runs to a display and the user adjusts...