The third and final installment of the Cyber Security Essentials series identifies best practices for protecting your internal and external networks, components of well-secured networks, and other dangers to be aware of.
In Parts I & II of this article, we outlined some of the most common cyber attacks, and got some great feedback from an ethical hacker on system architecture that can protect your network. In this final section we’ll finish the interview with a discussion about the weakest link in most networks.
The second installment of the Cyber Security Essentials series looks at what a robust network security system looks like, with insights from an ethical, professional hacker.
In Part I of this series, we outlined some of the most common cyber attacks and some of the simple ways a user can guard against them. I sat down with an ethical hacker to hash out what robust network security looks like.
The first installment of the Cyber Security Essentials series introduces the topic of cyber security and outlines the major concepts to be aware of.
The capabilities of a DCS appear so limitless that we’re sometimes asked to replicate an external third-party application in the existing control system. Keep these four considerations in mind.
The modern distributed control system (DCS) is extremely powerful and highly versatile. The capabilities appear so limitless that we’re sometimes asked about the option to replicate an external third-party application in the existing control system. Typical justifications include saving thousands each year in maintenance costs and product support while streamlining operator training. Though it would appear that this might be a fairly small project, there can be a lot more to consider than meets the eye, especially to someone that's not highly attuned to complex control configuration. Before signing on the dotted line, here are a few things to keep in mind.