SCADA systems play an indispensable role in efficiently operating Tenaga Nasional Berhad's (TNB) extensive power grid. As the largest electric utility in Malaysia, TNB relies on SCADA systems to monitor and control its transmission and distribution networks across Peninsular Malaysia, Sabah and Labuan. Implementation of SCADA across nearly all of TNB's primary substations has enabled remote monitoring and control, reducing power outage times. However, regular assessment and mitigation of cyber security threats is needed to ensure the continued success of TNB's SCADA operations.
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksSchneider Electric
While best practice has leaned toward keeping control and
safety isolated from each other, recent enterprise data integration
and cost control initiatives are providing incentive to
achieve some level of integration. This paper describes three
basic integration models, including an “interfaced” approach,
in which separate control and safety communicate via a
custom built software bridge; an “integrated but separate”
approach, in which the disparate systems sit on the same
network, but share information only across isolated network
channels; and a “common” approach, in which both control
and safety systems share a common operating system. The
authors then compare the three approaches according to
compliance with safety standards and cost efficiencies.
The electric power grid has changed significantly over the past decade and continues to change as technology evolves. More and more, new-generation substation control systems are based on open standards and commercial technology, including Ethernet and TCP/IP based communication protocols such as IEC 60870-5-104, DNP 3.0 or IEC 61850. While this change in technology has brought about huge operational benefits, it has introduced cyber security concerns and a potential challenge to network reliability. Electronic intrusion into a substation can misdirect or terminate service, and this intrusion can be from internal individuals or external hackers or organizations.
Many substation control and diagnostic systems in deployment were not designed for real-time security functionality and centralized system administration with robust access control. Utilities must implement policies to protect their substation systems against intrusion from within and from outside the corporate network. Further, they must be able to detect intrusion when it does occur to eliminate future untoward effects. Finally, they need to be prepared with planned response and restoration that not only returns targeted functionality but can improve system security.
The global power industry has stepped up its focus on cyber security for control and automation systems, and standards are in place identifying the functionalities required for secure substation operation. Utilities looking to protect against cyber attack on their substation automation systems must implement the SCADA, RTU and IED solutions that incorporate proven-technology and the security mechanisms meeting these standards.
U.S. smart grid expenditures have been compromised largely of advanced metering infrastructure (AMI ) projects over the past five years. However, many utilities are now eager to fully optimize their systems with grid automation projects, which will allow them to fully realize the promise of the smart grid. Grid automation will create a much more reliable and efficient grid, enable optimization of thousands of grid-connected devices and distributed generation sources, and allow for faster outage recovery times.
Federal smart grid deployment targets, renewable portfolio standards, and the need to increase grid reliability have driven U.S. grid automation. However, as electricity markets open up in the U.S., grid automation projects will also be driven by a strong need to increase electric provider customer satisfaction.
As U.S. utilities embrace global standards such as IEC 61850, vendors with field proven grid analytics, advanced DMS, sensors, IEDs, and FLISR solutions will be best positioned in the market. The long-term result of such investments in grid automation will result in a significantly more reliable and efficient grid, higher utility customer satisfaction, and lower energy bills.
The major findings in this report show that a large majority of U.S. utilities are ready to take up the task of building a grid that meets the needs of tomorrow’s Connected Economy. However, utilities will need strong support from industry stakeholders (vendors, integrators, regulators, etc.) and electric customers to meet this goal.
[Oil & Gas White Paper] Control Room Management - Alarm Management Schneider Electric
Industry best practices call for pipeline operators to define a clear alarm management plan that helps avoid controller overload and ensures alarms are accurate and support safe pipeline operation. Review of controller workload is key in this program, as it can provide the most critical information on how to improve the performance of an alarm system and the controllers monitoring it. Controller performance can be impaired when deluged with too many SCADA alarms, a significant increase in the number of points being monitored and alarms related to communications, which all add to other attention-demanding activities not directly related to alarms.
Developing a program to analyze and continually improve the alarm system includes identification of the operator’s Alarm Philosophy: identifying what constitutes an alarm, who manages it, how it is managed and how training and change of management are carried out. Other best practices of an alarm management program include benchmark and performance audits; rationalisation to determine which SCADA alarms warrant response; and implementation, in an auditable manner, of actions defined.
When implementing an alarm management improvement program, the highest benefit is realised through strategies that involve little advanced technology. These high benefit strategies include alarm storm reviews, tuning alarm settings on nuisance alarms and fixing known issues; adjusting deadbands of repeating alarms; and eliminating alarms with no defined response. Strategies of medium benefit include suppression of alarms from ‘out of service’ stations; replacing absolute alarms with deviation alarms; and filtering, de-bouncing, or suppressing repeater alarms. Other advanced alarm improvement strategies that can provide additional benefit after initial strategies have been implemented include use of dynamic alarm thresholds, operator-set alarms and operational mode suppression. Tracking improvement in the alarm program after modifications are made is important, especially as operations bring in larger point counts.
Schneider Electric actively participates in industry alarm management programs to assure its advanced-technology Control Room Management solution targets best practices and meets new regulations for improved alarm management in the pipeline sector and other control implementations.
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
Federal agencies are moving their industrial control systems (ICS) from operational business networks to separate, dedicated networks in order to enhance security. However, without a system to test the new equipment and software coming into these separate networks, security risks will persist. This paper explores the impact on security of instituting a sanctioned ICS test lab and recommends best practices for setting up and operating these labs.
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksSchneider Electric
While best practice has leaned toward keeping control and
safety isolated from each other, recent enterprise data integration
and cost control initiatives are providing incentive to
achieve some level of integration. This paper describes three
basic integration models, including an “interfaced” approach,
in which separate control and safety communicate via a
custom built software bridge; an “integrated but separate”
approach, in which the disparate systems sit on the same
network, but share information only across isolated network
channels; and a “common” approach, in which both control
and safety systems share a common operating system. The
authors then compare the three approaches according to
compliance with safety standards and cost efficiencies.
The electric power grid has changed significantly over the past decade and continues to change as technology evolves. More and more, new-generation substation control systems are based on open standards and commercial technology, including Ethernet and TCP/IP based communication protocols such as IEC 60870-5-104, DNP 3.0 or IEC 61850. While this change in technology has brought about huge operational benefits, it has introduced cyber security concerns and a potential challenge to network reliability. Electronic intrusion into a substation can misdirect or terminate service, and this intrusion can be from internal individuals or external hackers or organizations.
Many substation control and diagnostic systems in deployment were not designed for real-time security functionality and centralized system administration with robust access control. Utilities must implement policies to protect their substation systems against intrusion from within and from outside the corporate network. Further, they must be able to detect intrusion when it does occur to eliminate future untoward effects. Finally, they need to be prepared with planned response and restoration that not only returns targeted functionality but can improve system security.
The global power industry has stepped up its focus on cyber security for control and automation systems, and standards are in place identifying the functionalities required for secure substation operation. Utilities looking to protect against cyber attack on their substation automation systems must implement the SCADA, RTU and IED solutions that incorporate proven-technology and the security mechanisms meeting these standards.
U.S. smart grid expenditures have been compromised largely of advanced metering infrastructure (AMI ) projects over the past five years. However, many utilities are now eager to fully optimize their systems with grid automation projects, which will allow them to fully realize the promise of the smart grid. Grid automation will create a much more reliable and efficient grid, enable optimization of thousands of grid-connected devices and distributed generation sources, and allow for faster outage recovery times.
Federal smart grid deployment targets, renewable portfolio standards, and the need to increase grid reliability have driven U.S. grid automation. However, as electricity markets open up in the U.S., grid automation projects will also be driven by a strong need to increase electric provider customer satisfaction.
As U.S. utilities embrace global standards such as IEC 61850, vendors with field proven grid analytics, advanced DMS, sensors, IEDs, and FLISR solutions will be best positioned in the market. The long-term result of such investments in grid automation will result in a significantly more reliable and efficient grid, higher utility customer satisfaction, and lower energy bills.
The major findings in this report show that a large majority of U.S. utilities are ready to take up the task of building a grid that meets the needs of tomorrow’s Connected Economy. However, utilities will need strong support from industry stakeholders (vendors, integrators, regulators, etc.) and electric customers to meet this goal.
[Oil & Gas White Paper] Control Room Management - Alarm Management Schneider Electric
Industry best practices call for pipeline operators to define a clear alarm management plan that helps avoid controller overload and ensures alarms are accurate and support safe pipeline operation. Review of controller workload is key in this program, as it can provide the most critical information on how to improve the performance of an alarm system and the controllers monitoring it. Controller performance can be impaired when deluged with too many SCADA alarms, a significant increase in the number of points being monitored and alarms related to communications, which all add to other attention-demanding activities not directly related to alarms.
Developing a program to analyze and continually improve the alarm system includes identification of the operator’s Alarm Philosophy: identifying what constitutes an alarm, who manages it, how it is managed and how training and change of management are carried out. Other best practices of an alarm management program include benchmark and performance audits; rationalisation to determine which SCADA alarms warrant response; and implementation, in an auditable manner, of actions defined.
When implementing an alarm management improvement program, the highest benefit is realised through strategies that involve little advanced technology. These high benefit strategies include alarm storm reviews, tuning alarm settings on nuisance alarms and fixing known issues; adjusting deadbands of repeating alarms; and eliminating alarms with no defined response. Strategies of medium benefit include suppression of alarms from ‘out of service’ stations; replacing absolute alarms with deviation alarms; and filtering, de-bouncing, or suppressing repeater alarms. Other advanced alarm improvement strategies that can provide additional benefit after initial strategies have been implemented include use of dynamic alarm thresholds, operator-set alarms and operational mode suppression. Tracking improvement in the alarm program after modifications are made is important, especially as operations bring in larger point counts.
Schneider Electric actively participates in industry alarm management programs to assure its advanced-technology Control Room Management solution targets best practices and meets new regulations for improved alarm management in the pipeline sector and other control implementations.
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
Federal agencies are moving their industrial control systems (ICS) from operational business networks to separate, dedicated networks in order to enhance security. However, without a system to test the new equipment and software coming into these separate networks, security risks will persist. This paper explores the impact on security of instituting a sanctioned ICS test lab and recommends best practices for setting up and operating these labs.
Are your industrial networks protected...Ethernet Security Firewalls Schneider Electric
Security incidents rise at an alarming rate each year. As the complexity of the threats increases, so do the security measures required to protect industrial networks. Plant operations personnel need to understand security basics as plant processes integrate with outside networks. This paper reviews network security fundamentals, with an emphasis on firewalls specific to industry applications. The variety of firewalls is defined, explained, and compared.
Press Conference at Hannover Messe #HM15SE...As a leader in energy management and industrial automation our interconnected technologies, solutions and services help unlock unprecedented value and ensure Industry Is On everywhere
How the Convergence of IT and OT Enables Smart Grid DevelopmentSchneider Electric
The goal for any utility that invests in smart grid technology is to attain higher efficiency and reliable performance.
A smart grid platform implies the convergence of Operations Technology (OT) – the grid physical infrastructure assets and applications–and Information Technology (IT) – the human interface that enables rapid and informed decision making.
This paper describes best practices for migrating to a scalable, adaptable, smart grid network.
Get with the system - Rogerio Martins, Schneider Electric disucsses the advantages of modern distributed control systems in coal handling preparation plants.
How Service-Oriented Drive Deployments improve VSD Driveline UptimeSchneider Electric
Variable Speed Drives (VSDs) have proliferated and are now installed in large numbers throughout various industries. However, since these technologies are relatively new, not much thought has been given to the proper integration of these drives, nor have their potential energy savings and business continuity entitlements been fully realized. This paper examines how the intelligence within VSDs can be leveraged to perform predictive maintenance so that plant uptime can improve.
Creating a Reliable and Secure Advanced Distribution Management SystemSchneider Electric
As public utilities strive to build an efficient distribution network, they are looking to automated solutions. One such solution is the advanced Distribution Management System (ADMS) that integrates SCADA, DMS and OMS technology, for optimum performance efficiency. Instead of operating with proprietary protocols on isolated networks, this approach applies open-system design – and makes security of the SCADA system paramount.
In the U.S., the National Institute of Standards and Technology (NIST) is leading the efforts toward establishment of security standards for SCADA networks that process unclassified information. The North American Electric Reliability Council (NERC), with oversight by the U.S. Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada, enforces mandatory cyber security standards for the bulk power system in North America. Beyond North America, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) maintain the ISO/IEC 27001 Information Security Management System standard.
It is these standards that make possible the performance efficiency of an interoperable ADMS open system while actually improving the security of older, proprietary SCADA/DMS/OMS systems.
The NERC Critical Infrastructure Protection (CIP) guidelines establish best practices for the minimal level of security required for safe and secure operations of a modern ADMS solution. They fully describe the system’s security objectives but leave to the user the choice of technology that best achieves these objectives for the user’s network. These guidelines describe access control and event logging, personnel training, maintenance of the electronic security perimeter, incident reporting and response planning, and security auditing. The utility that implements an ADMS solution that complies with these guidelines is positioned not only for operational effectiveness and enterprise-wide efficiency but also security of operations. It is recommended that the ADMS solution vendor be actively involved in industry working groups, to support compliance with the latest developments.
An open-architecture, fully configurable ADMS system meeting NERC CIP guidelines will offer security at all operational levels, even as the network grows and software upgrades are applied.
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Schneider Electric
Most utilities struggle to organize information about their distribution network assets. Operations, engineering, accounting, and other business functions all use different tools and systems, forcing grid operators to synchronize separate databases. This paper presents an improved approach to managing grid assets by establishing a ‘single source of the truth,’ eliminating special-purpose databases, utilizing spatial databases, and incorporating a workflow management tool to support database updates.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Dtech 2015 the distribution management system network modelSchneider Electric
The presentation will illustrate the methodology deployed to achieve an accurate Distribution Network Model at Duke Energy Carolinas. It will also dive in to the impact on various stakeholders in the organization, as well as the change management process that drives the successful implementation of the model.
The Cloud Computing model is replacing the traditional IT model for many organizations that have not been able to keep up with the tremendous rate at which technology is changing, the challenges of disparate IT systems inherited through acquisitions and mergers, and decreasing internal resources available for IT commitment.
Cloud Computing models range from public cloud services that bill companies for access to IT infrastructure; the private cloud provider that hosts resources for the sole use of its own organization; dedicated external hosting to non-shared resources; and hybrid hosting, a mixed solution of cloud computing and dedicated hosting.
Schneider Electric consulting experts use their Cloud Assessment Checklist to help potential clients identify the computer services needs that best meet their IT challenges. It is not uncommon to find that an organization would optimize operation with a hybrid hosting solution in which a secure, single-tenant database would be stored with a dedicated host and the front-end would be hosted in the public cloud. Similarly, cloud bursting functionality enables the organization to automatically deploy new applications within the public cloud as needed. Such hybrid hosting models allow scaling capability to accommodate an increase in the number of users in the organization and meet peak traffic demand.
Careful examination of business and security characteristics can determine the proper cloud and hosting model that meets the needs of any particular enterprise and, as a result, help increase the organization’s IT capabilities and productivity while adding value to the business.
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Weather, especially severe weather, can substantially impact your utility’s operations. Lightning can strike substations, high winds can bring down branches, ice can snap lines, and hurricanes in particular can be catastrophic. What’s more, each has the potential to leave thousands without power.
At Schneider Electric, we offer MxVision WeatherSentry Web Services to provide your utility with highly accurate weather observations and forecasts that support strategic operational decisions. This proven information is relied on by organizations worldwide to protect people, resources, and profitability. In addition, our forecasts have been ranked the most accurate in the industry for the last seven consecutive years, in an independent study.
The Mine Central Control Room: From Concept to Reality Schneider Electric
Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). The main concept of a central control room is the ability to gather and automatically transform information from different sources and mines into business decisions, centralizing and monitoring them from a single location. This central control room also acts as a complete repository of all business operations including mine planning, metrics, asset management, quality and process control, surveillance, sustainability data, emissions, energy efficiency projects, weather and more.
Wood-Mizer in Indianapolis, IN, one of the world’s
leading industrial sawmill manufacturers, has developed
the next generation of industrial sawmills by combining
a thin-kerf blade and advanced automation technology
for maximum log yield and profitability.
While many utilities look forward to the benefits of deploying smart grid technology, they need help on where and how to start. A manageable distribution management system (DMS) pilot implementation is a good kickoff toward the smart grid goal, because it successfully demonstrates the possibilities while it builds support from stakeholders across the enterprise. Schneider Electric helps the utility implement the DMS pilot, using a phased Build — Learn — Plan — Execute approach.
In such a DMS pilot project, the company works with a small team of utility personnel knowledgeable of the organization’s network data stores and analytical functions. They build a fully operational load flow model that represents a subset of the network and reflects circuit data from the GIS database or other sources and includes two HV/MV substations and four to eight feeders, ideally with the switches and enough load profile data to support some switching and basic optimization functionality.
In the Learn phase of the DMS pilot, team members evaluate functionality of the model and completeness and accuracy of the data used. Tuning the model builds team confidence in its understanding of the data needed and the accuracy of the basic DMS algorithms.
In the Plan phase, the utility identifies current business plan and internal and external drivers toward grid automation, considering throughout the political and regulatory environments. A strategy is designed to remove obstacles and achieve identified goals.
In the final Execute phase, the utility will contract for software and services; train core team; develop system configuration and convert data; and finally deploy the system with site acceptance testing and rollout.
This fastrack DMS implementation gets the utility started and moving at the ‘speed of value’ as it builds confidence in DMS technology. It offers a proof-of-concept of DMS benefits across the organization — more reliable service, reduction of peak demand, utility cost savings and more.
Are your industrial networks protected...Ethernet Security Firewalls Schneider Electric
Security incidents rise at an alarming rate each year. As the complexity of the threats increases, so do the security measures required to protect industrial networks. Plant operations personnel need to understand security basics as plant processes integrate with outside networks. This paper reviews network security fundamentals, with an emphasis on firewalls specific to industry applications. The variety of firewalls is defined, explained, and compared.
Press Conference at Hannover Messe #HM15SE...As a leader in energy management and industrial automation our interconnected technologies, solutions and services help unlock unprecedented value and ensure Industry Is On everywhere
How the Convergence of IT and OT Enables Smart Grid DevelopmentSchneider Electric
The goal for any utility that invests in smart grid technology is to attain higher efficiency and reliable performance.
A smart grid platform implies the convergence of Operations Technology (OT) – the grid physical infrastructure assets and applications–and Information Technology (IT) – the human interface that enables rapid and informed decision making.
This paper describes best practices for migrating to a scalable, adaptable, smart grid network.
Get with the system - Rogerio Martins, Schneider Electric disucsses the advantages of modern distributed control systems in coal handling preparation plants.
How Service-Oriented Drive Deployments improve VSD Driveline UptimeSchneider Electric
Variable Speed Drives (VSDs) have proliferated and are now installed in large numbers throughout various industries. However, since these technologies are relatively new, not much thought has been given to the proper integration of these drives, nor have their potential energy savings and business continuity entitlements been fully realized. This paper examines how the intelligence within VSDs can be leveraged to perform predictive maintenance so that plant uptime can improve.
Creating a Reliable and Secure Advanced Distribution Management SystemSchneider Electric
As public utilities strive to build an efficient distribution network, they are looking to automated solutions. One such solution is the advanced Distribution Management System (ADMS) that integrates SCADA, DMS and OMS technology, for optimum performance efficiency. Instead of operating with proprietary protocols on isolated networks, this approach applies open-system design – and makes security of the SCADA system paramount.
In the U.S., the National Institute of Standards and Technology (NIST) is leading the efforts toward establishment of security standards for SCADA networks that process unclassified information. The North American Electric Reliability Council (NERC), with oversight by the U.S. Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada, enforces mandatory cyber security standards for the bulk power system in North America. Beyond North America, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) maintain the ISO/IEC 27001 Information Security Management System standard.
It is these standards that make possible the performance efficiency of an interoperable ADMS open system while actually improving the security of older, proprietary SCADA/DMS/OMS systems.
The NERC Critical Infrastructure Protection (CIP) guidelines establish best practices for the minimal level of security required for safe and secure operations of a modern ADMS solution. They fully describe the system’s security objectives but leave to the user the choice of technology that best achieves these objectives for the user’s network. These guidelines describe access control and event logging, personnel training, maintenance of the electronic security perimeter, incident reporting and response planning, and security auditing. The utility that implements an ADMS solution that complies with these guidelines is positioned not only for operational effectiveness and enterprise-wide efficiency but also security of operations. It is recommended that the ADMS solution vendor be actively involved in industry working groups, to support compliance with the latest developments.
An open-architecture, fully configurable ADMS system meeting NERC CIP guidelines will offer security at all operational levels, even as the network grows and software upgrades are applied.
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Schneider Electric
Most utilities struggle to organize information about their distribution network assets. Operations, engineering, accounting, and other business functions all use different tools and systems, forcing grid operators to synchronize separate databases. This paper presents an improved approach to managing grid assets by establishing a ‘single source of the truth,’ eliminating special-purpose databases, utilizing spatial databases, and incorporating a workflow management tool to support database updates.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Dtech 2015 the distribution management system network modelSchneider Electric
The presentation will illustrate the methodology deployed to achieve an accurate Distribution Network Model at Duke Energy Carolinas. It will also dive in to the impact on various stakeholders in the organization, as well as the change management process that drives the successful implementation of the model.
The Cloud Computing model is replacing the traditional IT model for many organizations that have not been able to keep up with the tremendous rate at which technology is changing, the challenges of disparate IT systems inherited through acquisitions and mergers, and decreasing internal resources available for IT commitment.
Cloud Computing models range from public cloud services that bill companies for access to IT infrastructure; the private cloud provider that hosts resources for the sole use of its own organization; dedicated external hosting to non-shared resources; and hybrid hosting, a mixed solution of cloud computing and dedicated hosting.
Schneider Electric consulting experts use their Cloud Assessment Checklist to help potential clients identify the computer services needs that best meet their IT challenges. It is not uncommon to find that an organization would optimize operation with a hybrid hosting solution in which a secure, single-tenant database would be stored with a dedicated host and the front-end would be hosted in the public cloud. Similarly, cloud bursting functionality enables the organization to automatically deploy new applications within the public cloud as needed. Such hybrid hosting models allow scaling capability to accommodate an increase in the number of users in the organization and meet peak traffic demand.
Careful examination of business and security characteristics can determine the proper cloud and hosting model that meets the needs of any particular enterprise and, as a result, help increase the organization’s IT capabilities and productivity while adding value to the business.
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Weather, especially severe weather, can substantially impact your utility’s operations. Lightning can strike substations, high winds can bring down branches, ice can snap lines, and hurricanes in particular can be catastrophic. What’s more, each has the potential to leave thousands without power.
At Schneider Electric, we offer MxVision WeatherSentry Web Services to provide your utility with highly accurate weather observations and forecasts that support strategic operational decisions. This proven information is relied on by organizations worldwide to protect people, resources, and profitability. In addition, our forecasts have been ranked the most accurate in the industry for the last seven consecutive years, in an independent study.
The Mine Central Control Room: From Concept to Reality Schneider Electric
Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). The main concept of a central control room is the ability to gather and automatically transform information from different sources and mines into business decisions, centralizing and monitoring them from a single location. This central control room also acts as a complete repository of all business operations including mine planning, metrics, asset management, quality and process control, surveillance, sustainability data, emissions, energy efficiency projects, weather and more.
Wood-Mizer in Indianapolis, IN, one of the world’s
leading industrial sawmill manufacturers, has developed
the next generation of industrial sawmills by combining
a thin-kerf blade and advanced automation technology
for maximum log yield and profitability.
While many utilities look forward to the benefits of deploying smart grid technology, they need help on where and how to start. A manageable distribution management system (DMS) pilot implementation is a good kickoff toward the smart grid goal, because it successfully demonstrates the possibilities while it builds support from stakeholders across the enterprise. Schneider Electric helps the utility implement the DMS pilot, using a phased Build — Learn — Plan — Execute approach.
In such a DMS pilot project, the company works with a small team of utility personnel knowledgeable of the organization’s network data stores and analytical functions. They build a fully operational load flow model that represents a subset of the network and reflects circuit data from the GIS database or other sources and includes two HV/MV substations and four to eight feeders, ideally with the switches and enough load profile data to support some switching and basic optimization functionality.
In the Learn phase of the DMS pilot, team members evaluate functionality of the model and completeness and accuracy of the data used. Tuning the model builds team confidence in its understanding of the data needed and the accuracy of the basic DMS algorithms.
In the Plan phase, the utility identifies current business plan and internal and external drivers toward grid automation, considering throughout the political and regulatory environments. A strategy is designed to remove obstacles and achieve identified goals.
In the final Execute phase, the utility will contract for software and services; train core team; develop system configuration and convert data; and finally deploy the system with site acceptance testing and rollout.
This fastrack DMS implementation gets the utility started and moving at the ‘speed of value’ as it builds confidence in DMS technology. It offers a proof-of-concept of DMS benefits across the organization — more reliable service, reduction of peak demand, utility cost savings and more.
Abstract:
Corporate governance is very important in our business world today, especially after the frequent non-stop worldwide financial crises. Strong corporate governance is now considered a basic condition to accept and register an organization in most of the Stock Exchange Markets all over the world. The audit committee plays a major role in corporate governance regarding the organization’s direction, control, and accountability. As a representative of the board of directors and main part of the corporate governance mechanism, the audit committee is involved in the organization’s both internal and external audits, internal control, accounting and financial reporting, regulatory compliance, and risk management. This paper focuses on the audit committee’s powers, functions, responsibilities, and relationships within the framework of corporate governance.
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...Dhana Raj Markandu
Conference on Electricity Power Supply Industry (CEPSI) 2012, Bali, Indonesia
(Accepted for presentation but not published due to unforeseen withdrawal of author)
SCADA Courses, SCADA is maybe the most imperative and ordinarily utilized modern control framework design on the planet. SCADA remains for Supervisory Control and Data Acquisition, a PC arrange framework for social affair and dissecting ongoing information. SCADA frameworks are utilized to screen and control a plant or gear in businesses, for example, broadcast communications, water and waste control, vitality, oil and gas refining and transportation.
The key property of a SCADA framework is its capacity to play out a supervisory task over an assortment of other restrictive gadgets. Additionally, SCADA frameworks are imperative as a result of mechanization. It enables an association to precisely contemplate and envision the ideal reaction to estimated conditions and execute those reactions consequently inevitably. Depending on exact machine control for checking gear and procedures for all intents and purposes wipes out human mistake.
SCADA frameworks were first utilized as a part of the 1960s. They can be moderately straightforward, for example, one that screens ecological states of a little place of business, or inconceivably unpredictable, for example, a framework that screens all the movement in an atomic power plant or the action of a city water framework.
Some of the major benefits from using SCADA include:
Reduced time consumption
Optimized human resource consumption
Increased product/project revenue
Greater remote accessibility
Implementation of user access levels for enhanced security
Instantaneous alert on alarms or events
Organized data records and automatic report generation
Real-time data analysis
Ensure system availability at all times
Easy user interfaces for interaction through a quality HMI
Automated calculation
Energy Field Applications:
SCADA frameworks have ended up being particularly valuable in vitality related ventures where continuous data is critical, for example, in circumstances where there's revelation of an oil or gas spill.
SCADA Training:
Tonex has been putting forth SCADA training since 2001. As of now Tonex offers a few SCADA Training courses including an essential course, Solar SCADA Training, Wind Energy SCADA Training, ICS Cybersecurity Training and SCADA Security Training.
Why Choose Tonex?
Presenting exceptionally modified learning arrangements is our specialty. For more than 30 years Tonex has worked with associations in enhancing their comprehension and capacities in themes regularly with new improvement, plan, enhancement, directions and compliances that, to be honest, can be hard to fathom.
For more data, questions, remarks, Contact us.
SCADA Training Courses
https://www.tonex.com/scada-training-courses/
Graduates of our PLC SCADA Training Institute in Noida program can look forward to a multitude of career opportunities in sectors like manufacturing, oil and gas, power generation, and many more. Roles such as Automation Engineer, Control System Engineer, SCADA Programmer, and PLC Technician become accessible, offering a promising career path in industrial automation.
https://aptronsolutions.com/best-PLC-SCADA-Training-in-Noida.html
SCADA Systems Vulnerabilities and Blockchain Technologyijtsrd
SCADA systems are one of the most important part of industrial operations. Before SCADA, plant personnel had to monitor and control industrial process via selector switches, pushbuttons and dials for analog signals. As manufacturing grew and sites became more remote, relays and timers were used to assist supervision. With the onset of technology and advent of network based protocols, these systems became more reliable, fast and it became easy to troubleshoot problems. Indeed progress also brings vulnerabilities, which was no new for SCADA. The IP protocols brought threat to the security of these systems. The devastation that cyber predators on SCADA can inflict, could be illustrated by the Stuxnet virus attack. This paper discusses what SCADA systems are, their uses, protocols being used by these systems, vulnerabilities and ways to combat those vulnerabilities. It focusses on the use of Blockchain Technology as a step in security of such systems. Diksha Chhonkar | Garima Pandey "SCADA Systems: Vulnerabilities and Blockchain Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31586.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31586/scada-systems-vulnerabilities-and-blockchain-technology/diksha-chhonkar
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
Cloud assisted io t-based scada systems security- a review of the state of the art and future challenges.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
Asset Utilization Metrics Propel a Revival in Safety SolutionsARC Advisory Group
Asset Utilization Metrics Propel a Revival in Safety Solutions
Health and safety in the workplace has not always been a primary consideration
in manufacturing environments. However, there is a renewed
interest in safety emanating from Europe, highlighted by the European
Norm standard EN 954-1, which is garnering interest
in Japan and North America. Safety
technology has progressed considerably since the
first emergency stop relay appeared on the market,
and the future will bring new developments
to this technology. Improvement in the implementation
of current safety standards is mutually
beneficial for the protection of both man and machine
with the reduction of workplace accidents, lost output, damage to
machinery, and insurance premiums while resulting in an increase in Overall
Equipment Effectiveness (OEE). Manufacturers are currently reevaluating
the safety aspects of their machines and devices so as to provide
the safest possible workplace environment.
A new generation of safety solutions have
emerged that are more effective in
preventing accidents, less costly to
implement, more easily to adapt, more
reliable than existing hard wired systems,
and results in an increase in Overall
Equipment Effectiveness.
Supervisory Control and Data Acquisition (SCADA) System in Power System.pdfMd. Zawadul Ali
A short brief on SCADA system in Power System.
SCADA systems are used in power systems to monitor and control the generation, transmission, and distribution of electricity. They provide operators with real-time information about the state of the grid, which helps to improve reliability, efficiency, and safety.
SCADA systems are essential for the operation of modern power grids, which are becoming increasingly complex and interconnected.
Case Study - Smart SCADA And The Use of Digital Twins In Renewable Energy PlantsIngeteam Wind Energy
Deploying a data-driven digital twin for the monitoring of a multi-technology asset portfolio in Latin America.
A leading asset owner in Latin America needed to unify the large and complex set of SCADA data generated in order to improve decision-making processes and create more value.
Discover how!
[whitepaper] Cellular Technology simplifies Smart Water Meter Deployments Orange Business Services
Sierra Wireless and Orange Business Services are ready to partner with OEMs and utilities
building the new generation of smart water metering technology. Providing fl exible hardware,
strong security, and a comprehensive device-to-cloud solution, a joint solution from Sierra
Wireless and Orange can help OEMs capitalize on this growing global market and help
optimize the world’s water supply.
7 Most Significant Underground Projects in Asia Today [Infograph]Darwin Jayson Mariano
In this very exclusive report, we’ve compiled the 7 most significant underground projects in Asia today. Find out where are these projects located, what’s the scope, how much has been allocated and what kind of impact it will create to the stakeholders involved. Never have we seen anything quite like it.
Improving safety for organisations require mere technological solutions and fixes. Understanding processes and plant interactions are equally important. Oftentimes, “blind spots” are recognized as a significant contributor to a major accident. Are you aware of: The Project Execution Woe, The Safety Assessment Hitch, The Technology Squeeze and six other blind spots?
SKY HIGH - The 7 Most Remarkable Tall Building Projects in the WorldDarwin Jayson Mariano
Tall building construction has gone a remarkable transformation over the past couple of years. Architects, engineers and building owners are now much more attuned to the latest innovations that will wow even the most seasoned construction professional. In this special issue, marvel at the most remarkable tall building projects in the world today – from Australia to Singapore to the Middle East – and find out how high a super tall skyscraper these days can be.
The explosion of information in almost all quarters of our lives has changed the way we make decisions. In a world that is rapidly evolving, how can modern day defence organizations take advantage of the latest technology in geo-spatial intelligence? What are the unique challenges that Asian defence organizations face and how are these challenges being addressed, now?
Battle of Mega Bridges - The 7 Highly Notable Mega Bridge Projects Darwin Jayson Mariano
Not your ordinary infrastructure project, mega bridge projects worth billions of dollars and tens of thousands of kilometres in length are highly complex and requires significant amount of technical skills. In this infograph, we’ve compiled the 7 Highly Notable Mega Bridge Projects you should know about and why it matters.
TRAILBLAZING: Shared Services and Outsourcing Trends in Asia 2013 Darwin Jayson Mariano
The trend lines are clear – Asian economies will outperform the rest of the world in 2013, at least according to the latest IMF, Standard Chartered research. But, how will this impact shared services and outsourcing organisations in Asia? What are the trends specific to this industry? The challenges, the demographics and the Asian advantage – this information is simply too difficult to ignore.
The growing fascination over the Chinese market is felt in almost all industries around – especially within the luxury sector. Study after study reveals that China is an important market that luxury brands shouldn’t – and couldn’t – ignore. However, confronting the realities on the ground could be challenging, albeit necessary for a brand to truly succeed in this market. What are the types of Chinese millionaires? Where do they live? How do they make their purchase decision? Take a look and find out.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraAvirahi City Dholera
The Tata Group, a titan of Indian industry, is making waves with its advanced talks with Taiwanese chipmakers Powerchip Semiconductor Manufacturing Corporation (PSMC) and UMC Group. The goal? Establishing a cutting-edge semiconductor fabrication unit (fab) in Dholera, Gujarat. This isn’t just any project; it’s a potential game changer for India’s chipmaking aspirations and a boon for investors seeking promising residential projects in dholera sir.
Visit : https://www.avirahi.com/blog/tata-group-dials-taiwan-for-its-chipmaking-ambition-in-gujarats-dholera/
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Attending a job Interview for B1 and B2 Englsih learnersErika906060
It is a sample of an interview for a business english class for pre-intermediate and intermediate english students with emphasis on the speking ability.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
1. SCADA
Success
the Best Measure of
Darwin Jayson Mariano
With almost RM88 billion in assets, according to its 2012
Annual Report, Tenaga Nasional Berhad (TNB) is the largest
electric utility in Malaysia and selected as the No. 1 “Electric
Utilities in Asia” in the coveted Platts Top 250 Global Energy
Company Rankings for 2013. Employing more than 33,500
people group-wide, the company serves more than 8.3
million customers Peninsular Malaysia, Sabah and Labuan
and continues to provide reliable and efficient electricity
services for more than 60 years now.
2. Aside from its people, TNB’s success can also be attributed to their investment in
world-class infrastructure and top-notch systems and processes to support its growing
network of customers. And one of the key systems right at the heart of TNB’s operations
is SCADA.
SCADA or Supervisory Control and Data Acquisition is a type of Industrial Control
System (ICS) that monitors and controls industrial processes that exist in the physical
world. SCADA systems historically distinguish themselves from other ICS systems by
being large scale processes that can include multiple sites, and large distances.
When applied properly, SCADA can help industries eliminate the need for site visits
by personnel for inspection, data collection, etc. The software tool enables real time
monitoring of operations as well as make modifications to systems, troubleshoot and
generate reports automatically. The end result is tremendous savings in time and
money, not to mention enhanced operational efficiency, which could translate to
increased revenue and profits for the company.
However, implementing successful SCADA systems require detailed planning, not to
mention massive investments of time, people and financial resources. In going about
such a major undertaking, engineers and project managers have outlined the following
‘rules’ to observe during implementation and operations of SCADA systems:
Choose your system wisely
There are two main things that should be taken into consideration when purchasing
a SCADA system: a) Which provider to opt for: legacy providers, historical reputation
and peer preference are all factors that play a part in this; and b) Sector-specific
needs: making sure that the system you choose is aligned to the requirements of your
organisation and sector is key.
Get network integration right
Migrating from one system to another can often lead to significant downtime as well
as data loss, damaged data integrity and inaccurate data transfer. In an oil & gas or
petrochemical facility, such losses could be detrimental to consumers or potentially
catastrophic, so making sure that integration is carried out efficiently and with
contingency planning in play is vital.
Prepare for environmental hazards
If remote terminal units (RTUs) are based out in the open, extreme conditions will
eventually take their toll. Improving the durability of SCADA equipment is paramount
for regions such as Asia with scorching temperatures during the day, cold nights and
abrasive and inhospitable conditions.
For maximum performance, periodic maintenance should be carried out in-line with a
10 – 15 year equipment lifespan.
Plan for replacement of obsolete units
The obsolescence of integral parts of the SCADA framework is inevitable with the
march of time and quick-fire advancements in technology, so having a replacement
plan is a must to prevent loss of money and time. This downtime can also be minimized
by initially selecting a SCADA package that improves usability, maximises flexibility and
provides for future expansion.
3. Keep security threats at bay
Computer viruses evolve quickly as their uploaders are diligent, and threat profiles are
updated with frightening constancy. Having regular and thorough auditing strategies is
one way to make sure that security threats are always in check and your SCADA systems
are up to the task.
Assess your vulnerability regularly
Given the myriad threats that exist out there, it is still difficult to quantify exactly
how vulnerable a SCADA system is to an attack. Assessments can be made to reduce
the causes of vulnerability through threat simulation, and the most classic of these
methods is the use of attack trees. An attack tree may be an extremely complex analysis
of thousands of different potential pathways from root threat to attack completion,
yet it would be impossible to cover all the possible routes, so running regular checks is
absolutely necessary.
Ensure interoperability without sacrificing security
Many SCADA systems use their own dedicated and proprietary communication
protocols as opposed to shared and open systems. Within wide-ranging networks, the
interoperability of different systems is crucial to the smooth running of the framework
as a whole.
SCADA :
A TNB Case Study
For Tenaga Nasional, operational efficiency is clearly an
important aspect of the business – and one that TNB is
exceptionally good at. In an interview with Michael Khor,
TNB’s Deputy Chief Engineer for SCADA, he explained the
‘indispensable’ role of SCADA systems:
“SCADA systems bring significant value to organizations such as power utilities. It is the
indispensable technology that enables the safe, secure and economic operation of the
power grid.
Together with the relevant suite of power applications, SCADA is typically utilised in
the form of Energy Management Systems for transmission grids and as Distribution
4. Management Systems for the distribution system. The ultimate just-in-time supplydemand paradigm of power grids perhaps bring forth many folds of benefit, to more
than justify the direct cost of SCADA ownership. There is significant contribution to the
bottom line when operations are made more efficient, mistakes are reduced and costly
blackouts are averted,” he explains.
While the indispensable role of SCADA systems couldn’t be overemphasised, Mr. Khor
also noted that threats, in relation to SCADA systems, continue to exist and should be
managed on a regular basis. One of which is the threat on cyber security.
“Cyber security should be viewed in respect to how it can potentially disrupt business
continuity. Be it traditional hackers, careless or disgruntled employees, organisations
need to recognise the multi-dimensional security threats from both internal and
external sources.
“The risks associated with these threats can be mitigated by, for instance, carrying out
an assessment, which will provide the relevant directions and drive the strategies that
will best address the threats. Having adequate security does come at a cost, in terms of
procurement and also in terms of ownership. It certainly helps to procure from vendors
that have incorporated security features in their design. Better still are vendors that get
their SCADA system design security certified,” enthused Mr. Khor.
In its 2012 Annual Report, TNB revealed that it “has completed the installation of
the Supervisory Control and Data Acquisition (SCADA) system in 94% of its primary
substations. All primary distribution substations are targeted to be equipped with
SCADA by 2015.”
If further reveals that “secondary substations in prime areas are also equipped with
SCADA facilities.”
The installation of SCADA across almost all primary substations gives TNB the ability to
have monitoring and control capabilities in even the most remote areas. This enables
“personnel at the control centres to restore electricity supply quickly in the event of an
unscheduled power outage, thereby reducing the duration of outage as measured by
SAIDI (System Average Interruption Duration Index).
The table below indicates a significant reduction in SAIDI over the last two
Financial Years.
Voltage
FY 2009/2010
FY 2010/11
% Reduction
33 kV
58.52
47.03
20%
22 kV
88.16
62.74
29%
11 kV
80.85
72.06
11%
Source: Tenaga Nasional Berhad Annual Report 2012
5. TNB’s Michael Khor couldn’t have said it more simply: “Having an effective SCADA
can be viewed perhaps as one of the more significant contributors to a power utility
keeping the lights ON.”
In its purest, most basic form, the best measure of SCADA success for utility firms
– electricity, gas, water and telecommunications – is not tied to the number of
installations done within a given period nor the percentage uptime per location/per
quarter. It is essentially the ability of utilities to deliver the promised service to the
consuming public in the most cost-effective and efficient manner.
Learning how to achieve this goal using industry best practices as well as
discovering the latest trends in SCADA implementation in your specific industries is
absolutely crucial.
SCADA :
Interview with Mr. Michael Khor
Q
A
Mr. Michael Khor, Deputy Chief Engineer - SCADA for Tenaga
Nasional Berhad (TNB) spoke to IQPC’s Darwin Jayson Mariano
and discussed how exactly a power utility company like TNB,
the largest energy and utility company in Malaysia, benefit
from SCADA.
Darwin Jayson Mariano: Please talk about some of the benefits of having a SCADA
system in place to Tenaga Nasional Berhad’s operations.
Michael Khor: SCADA systems bring significant value to organizations such as power
utilities. It is the indispensable technology that enables the safe, secure and economic
operations of the power grid. Together with the relevant suite of power applications,
SCADA is typically utilised in the form of Energy Management Systems for transmission
grids and as Distribution Management Systems for the distribution system. The
ultimate just-in-time supply-demand paradigm of power grids perhaps bring forth
many folds of benefit, to more than justify the direct cost of SCADA ownership. There is
significant contribution to the bottom line when operations are made more efficient,
mistakes are reduced and costly blackouts are averted. Essentially having an effective
SCADA can be viewed perhaps as one of the more significant contributors to a power
utility keeping the lights ON.
6. Q
A
Q
A
Q
A
DJM: Can you brief us on the key milestones of your SCADA Systems
implementation? What are the important lessons learned along the way?
Michael Khor: It is always quite important for the requirements analysis
phase to start by considering user requirements, so that they can derive the
optimum benefit when the new SCADA is implemented. Essentially the existing
weaknesses are addressed while the best features are maintained. This is
followed by translating these into specifications, followed by procurement; for
us this is normally by tender. Later once awarded, there is need to agree with
the proposed detail design and functional implementation. The acceptance
tests in the factory and later on site are major milestones before the SCADA
can commence commercial operations. Overall this is typically some 18 to 24
months from contract award.
DJM: Can you talk about cyber security threats in relation to SCADA systems
and what are the things that can be done in order to mitigate these threats?
Michael Khor: Cyber security should be viewed with respect to threats that
can potentially disrupt business continuity. Be it traditional hackers, careless
or disgruntled employees, organizations need to recognize the multidimensional security threats from both internal and external sources. The
risks associated with these threats can be mitigated by, for instance, carrying
out an assessment, the analysis of which will provide the relevant directions
and drive the strategies that will best address the threats. Having adequate
security does come at a cost, in terms of procurement and also in terms of
ownership. It certainly helps to procure from vendors that have incorporated
security features in their design; better still are vendors that get their SCADA
system design security certified. Consider too the vendors who have dedicated
teams tasked to review security vulnerabilities and address these via patches or
software revisions.
DJM: In your opinion, what is the typical lifecycle of a SCADA System?
Michael Khor: A while back, SCADA systems were like “married” to their
hardware. Then it was not uncommon to consider upgrades after some 10 or
even 20 years. While this is mostly no longer true, nevertheless the upgrade
path remains much less simplistic than desired. SCADA systems comprise
applications that typically reside on hardware developed for the increasing fast
evolving IT industry. This implies an increasingly shorter hardware lifecycle.
From a different perspective, consider the pairing of SCADA applications with
operating system versions, which in a way dictates the choice of hardware.
Consider also the typical 3 to 5 year procurement through implementation
period. Thus to seriously attain even a 10-year upgrade cycle, the activities
leading to the next upgrade need to commence perhaps almost back to back
with the just completed upgrade.
7. Q
A
DJM: What are the key considerations in upgrading or replacing obsolete
SCADA system?
Michael Khor: Just like aging, obsolescence is unavoidable, but can be managed. In
practice, some part of the SCADA is likely already to be superseded by newer versions
the very first day the operators get to use it. As it would neither be practical nor
economical to immediately replace any obsolete component, the strategy would be
to manage such circumstances. A key consideration is the availability of support. Thus
the so called drop dead upgrade by or replace by date is before end of support. It
would also make sense today to select vendors that can provide an upgrade strategy
or roadmap to steer through newer technology, in essence to as far as practical avoid
being caught in the obsolescence trap. Unless absolutely required, it is thus better to
avoid dependencies on proprietary technology or special customizations.
Michael Khor, Deputy Chief Engineer – SCADA
for Tenaga Nasional Berhad will be speaking
at the 6th Annual SCADA Asia happening on
26-27 February 2014 at the Grand Millennium
Kuala Lumpur, Malaysia. Discover the latest
trends in SCADA implementation for Oil & Gas
and Utilities and learn how to enhance security
while communicating efficiently across a
scalable SCADA network.
Visit www.scadasummit.com
Resources: Tenaga Nasional Berhad Annual Report 2012 (http://www.tnb.com.my/investorsmedia/annual-reports.html)
Disclaimer: Please note that we do all we can to ensure accuracy and timeliness of the information
presented herein but errors may still understandably occur in some cases. If you believe that a
serious inaccuracy has been made please let us know. This article is provided for information
purposes only. IQPC accepts no responsibility whatsoever for any direct or indirect losses arising
from the use of this report or its contents.