TITLE

Protect, connect, control

AUTHOR(S)
Fussell, Ellen
PUB. DATE
June 2004
SOURCE
InTech;Jun2004, Vol. 51 Issue 6, p39
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This article presents information on the ISA Expo 2004, an automation and control conference, training and exhibition in Houston, Texas. Fabio Terezinho of Indusoft plans to help attendees discover of their plants are vulnerable to a cyberattack. With the growing demand of interconnection between the plant and corporate networks, cybersecurity is becoming a major problem on the plant floor. Kevin Zamzow of Locus Inc. has submitted his view on the key challenges to wireless communication in industrial automation environments. The symposia will address Ethernet and Internet Protocol issues from the industrial perspective, detailing technical challenges and solutions, updates on Foundation fieldbus and Profibus and useful technologies applicable to all fieldbuses. The symposium on productivity and asset management will concentrate on making better use of plant capital assets and boosting productivity. The automation hierarchy makes up the asset management equation. The technical conference sessions include original technical presentations, paper and panel discussions and tutorials based on applications and techniques from manufacturing processes. Industrial network and systems security, productivity and asset management, industrial communications and networking are some of the topics speakers will cover.
ACCESSION #
13615136

 

Related Articles

  • Under Lock & Key. Seybold, Andrew M. // Wireless Review;09/01/99, Vol. 16 Issue 17, p49 

    Focuses on security issues on wireless access to corporate data. Significance of digital network; Implications of data encryption to network performance; Role of telecommunication carriers; Protection of voice calls.

  • WIRELESS.  // Electronic Design;1/7/2002, Vol. 50 Issue 1, p120 

    Reports developments related to wireless communication. Projections of the development of wireless technology; Increase in the use of 2.5G cell phones; Efforts to improve security in computer networks.

  • Bush team to tout cybersecurity plan. Messmer, Ellen; Marsan, Carolyn Duffy // Network World;9/16/2002, Vol. 19 Issue 37, p1 

    Reports on the launching of the National Strategy for Securing Cyberspace in the U.S. Increase awareness about network and application security; Recommendation of steps against cyberattacks; Securing of wireless systems. INSET: Cybersecurity plan taking shape.

  • How to hack Wi-Fi. Thompson, Jon // APC (Bauer Media Group);Jul2012, Vol. 32 Issue 7, p113 

    The article offers step-by-step instructions for improving Wi-Fi security of a wireless network.

  • Ask Dr. Internet. Bass, Steve // Network World;8/4/2003, Vol. 20 Issue 31, p37 

    Responds to a question on how to make the wireless access points of a computer network more secure. Use of a traveling wireless client system to detect wireless base stations; Steps to prevent unauthorized users from auto-connecting to the wireless network.

  • Security picks. Snyder, Joel; Thayer, Rodney // Network World;10/4/2004, Vol. 21 Issue 40, p47 

    This article provides some recommendations on wireless network security on the client side, for access points, and for wireless switches.

  • WEP: Stick a fork in it. Snyder, Joel; Thayer, Rodney // Network World;10/4/2004, Vol. 21 Issue 40, p47 

    This article reports that a round of testing wireless network security products has indicated that a variety of techniques can defeat them and some newer products might be more vulnerable to attack than older products.

  • Testing WEP security.  // Network World;10/4/2004, Vol. 21 Issue 40, p48 

    This article presents the results of tests of wireless network security for several products.

  • Glossary of wireless security terms.  // Network World;10/4/2004, Vol. 21 Issue 40, p48 

    This section presents a glossary of terms used in wireless network security.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics