04202024Sat
Last updateSun, 04 Feb 2024 4am

Exida announces a complimentary training class on their exSILentia® Safety Lifecycle tool

exida invites you to attend a complimentary training on the exSILentia® Safety Lifecycle tool. Attendees will learn how to perform Safety Integrity Level (SIL) Selection and Verification using the advanced capabilities of exSILentia® . This will help users determine the required risk reduction for each hazard scenario and the achieved risk reduction for each identified Safety Instrumented Function (SIF). The class will also cover interfacing with Process Hazard Analysis (PHA) results, documentation of the Safety Requirements Specification (SRS), and operational aspects such as proof testing.
Skills You Will Learn:

  • How to perform Safety Integrity Level (SIL) Selection and Verification using the advanced capabilities of exSILentia
  • Determine the required risk reduction for each hazard scenario and the achieved risk reduction for each identified Safety Instrumented Function (SIF)
  • Understand interfacing with Process Hazard Analysis results
  • Understand the documentation of the Safety Requirements Specification (SRS)
  • Understand operational aspects such as proof testing
  • Understand the impact of SIL verification parameters on the detailed design, implementation, and operation of the SIF

The final 2-hours of the course will discuss the new exSILentia® v4, including integration with the exida Layer of Protection Analysis (LOPA) tool, LOPAx™, the Process Hazard Analysis (PHA) tool, PHAx™, CHAZOP, and hands-on demonstrations.

 


Honeywell collaboration to Protect Industrial Control Systems from Cyber Attacks

Honeywell and Palo Alto Networks® are collaborating to boost the cyber security capabilities of control systems used by industrial facilities and critical infrastructure. Honeywell's Industrial Cyber Security business is now offering the Palo Alto Networks Next-Generation Security Platform to industrial customers. The collaboration enables customers to better prevent cyber attacks against their Process Control Networks (PCN) and Operational Technology (OT) environments in order to protect their assets and maximize production uptime and safety.

The joint solution offers unrivaled process network traffic monitoring and advanced threat prevention across the automation environment. It combines Palo Alto Networks' advanced and natively integrated security platform with Honeywell's unique process control domain expertise to provide a cyber security solution tailored for industrial customers. This next-generation offering enhances Honeywell's comprehensive portfolio of cyber security solutions, including its Industrial Cyber Security Risk Manager platform.

Jeff Zindel, vice president and general manager, cyber security, Honeywell Process Solutions said, "The collaboration with Palo Alto Networks expands our ability to provide proactive intrusion prevention resulting in more robust protection for our customers. It is an example of Honeywell's unique multi-vendor approach that integrates state-of-the-art technology with proven expertise so that customers can confidently rely on our cyber security capabilities, quickly and effectively prevent threats, and focus on their daily operations."

 

Yokogawa to provide Network Healthiness Check Service for enhanced plant cyber security

Yokogawa Electric Corporation announces that Yokogawa Solution Service Corporation, a subsidiary that is responsible for Yokogawa's control business in Japan, has taken an order from Asahi Kasei Chemicals Corp. to provide a network healthiness check service that analyzes and verifies the integrity of the data traffic on the control system communications busses at its Mizushima Works. An industry first*, this cyber security service for control systems combines network visualization technology with the collection and analysis of data traffic.

As the threat of cyber-attacks has increased in recent years, there is an urgent need for strong security measures with control systems, particularly those used in critically important infrastructure such as electric power, gas, and petrochemical plants. With the increasing sophistication of such attacks, it is often no longer sufficient to rely solely on general security measures such as the use of antivirus software. Yokogawa's network healthiness check service is able to visualize the status of communications traffic on a network after periodically collecting and analyzing log data. When data traffic from an unknown IP address, communication via an unspecified protocol or port, data loss, or some other potential hazard is detected, Yokogawa will then work with the customer to identify possible causes and propose any necessary improvements. Unlike conventional services that rely on the monitoring and analysis of vast amounts of control system communications traffic, Yokogawa's service is able to quickly and intuitively visualize and grasp the status of the control system's communications traffic so that quick action can be taken in response to any potential issue. Yokogawa jointly developed this visualization technology with Yasuo Okabe, a professor at Kyoto University; Hiroki Takakura, formerly an associate professor at Kyoto University and currently a professor at the National Institute of Informatics; and the National Institute of Information and Communications Technology (NICT).

Yokogawa develops and provides to its customers a variety of highly secure device and system solutions, and is also engaged in the provision of ongoing operational support services. The company will continue to assist its customers through the provision of control system cyber security solutions.

jordan Release Dates

Exida releases new White Paper: Explaining the differences in Mechanical Failure Rates

This white paper describes the distinction between failure rate prediction and estimation methods in general and then gives an overview of the procedures used to obtain dangerous failure rates for certain mechanical equipment using exida FMEDA predictions and OREDA estimations. exida frequently compares field failure rate data from various sources to FMEDA results in order to validate the FMEDA component library. However, because OREDA and FMEDA methods are quite different, it is not possible to compare their results directly. A methodology is presented which creates predictions and estimations that are more comparable. The methodology is then applied to specific equipment combinations and the results are compared. When differences in the results exist between the two methods, plausible explanations for the differences are provided.

The comparisons show that the OREDA failure rates are well within the range of the exida FMEDA results. The comparisons also show that, with two exceptions, the average FMEDA predictions for dangerous failure rates are only slightly less than those of the OREDA estimations. In those two exceptions, FMEDA predictions are higher than OREDA. Therefore, it is reasonable to conclude that, when compared in an “apples-to-apples” fashion, for the equipment analyzed in this paper, the exida FMEDA predictions and OREDA estimations are quite comparable.

Download White Paper

Levis X Jordan 6

Technology for Visualizing and Analyzing Control System Traffic to Verify its Integrity

Yokogawa Electric Corporation (Yokogawa, President: Takashi Nishijima) announces that it has worked with the National Institute of Information and Communications Technology of Japan (NICT, President: Dr. Masao Sakauchi), Professor Yasuo Okabe of Kyoto University, and former Associate Professor Hiroki Takakura of Kyoto University to jointly develop a technology that visualizes and analyzes control system traffic to verify its integrity. This technology, which has been integrated by Yokogawa in an industry-first network healthiness check service, can quickly detect security incidents such as a malware infection. This combines visualization technology with the collection and analysis of traffic data to verify the integrity of control system networks, and is expected to improve the security of control systems used in public utilities.

Control system security has become a serious concern in recent years due to the proliferation of cyber-attacks targeting critically important infrastructure like public utilities: electric power, gas, and water. As control systems increasingly rely on operating systems and standard protocols that are both open and versatile, cyber attacks are very common now with various infection routes not only via the Internet but also via USB memory devices and other media, making it difficult to prevent all malware infections. Therefore, there is an urgent need for a technology that can quickly detect security incidents. Such technology should not have an impact on control system availability (stable, continuous operation) as these systems need to keep operating without interruption for very long periods, even as long as several decades.

NICT, Yokogawa, and Kyoto University jointly developed a technology for visualizing and analyzing control system traffic to verify its integrity and quickly detect security incidents such as malware infections.

Unlike general information systems where the amount and direction of traffic keep changing, it is easier with control system networks to identify when traffic conditions are normal as these systems are designed and used for a specific purpose. We focused on this characteristic. Our technology saves data on normal control system traffic conditions as a white list. With reference to this list, the technology monitors the dynamic state of the control system network to detect any abnormalities such as an increase in traffic or communication with an unknown IP address that could be caused by malware.

Furthermore, by using NIRVANA*, a real-time traffic visualization system developed by NICT, we improved this technology to comply with unique communications protocols used by control systems. As a result, this technology can identify traffic conditions much easier when an abnormality is identified (Figures 2 and 3).

Since there is no need to install detection software on each control system host (or server), this technology is easy to be introduced and does not impact control system availability.

Dioni Tabbers