The Official Publication Of Isa - International Society Of Automation

1y ago
7 Views
2 Downloads
8.60 MB
45 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Gannon Casey
Transcription

2022O CTOB ERDIGITAL EDITIONTHE OFFICIAL PUBLICATION OF ISA –INTERNATIONAL SOCIETY OF AUTOMATIONThis Digital Edition of InTech magazine is brought to you by ISA –the International Society of Automation and the advertisers whosupport this publication.Identical to the print magazine that is available by mail six timesper year, this Digital Edition is distributed to 42,000 registeredsubscribers located around the globe.InTech advertisers support ISA and are pleased to provideadditional information about their automation products andservices. To obtain more information, first click the logos shownAUTOMATIONLEADERSHIPConferencein the column on the right to see the ads in the magazine.Then, on the ad page itself, use the QR code or website addressprovided to get additional information.International Society of AutomationSetting the Standard for Automation Register to subscribe to InTech MagazineDigital Edition and don’t miss a single issue.REGISTER TO SUBSCRIBEInTech/Automation.com Media PlannerInternational Society of AutomationSetting the Standard for Automation groups/137598InternationalSocietyOfAutomationISA InterchangeRichard T. SimpsonAccount ExecutiveEmail: richard@isa.orgChris NelsonAccount ExecutiveEmail: chris@isa.orgGina DiFrancescoAccount ExecutiveEmail: gina@isa.orgTrademarks used in this document are the property of their respective owners.

OCTOBER 2022OFFICIAL PUBLICATION OF THE INTERNATIONAL SOCIETY OF AUTOMATIONwww.isa.org/intechSECURE WIRELESSCOMMUNICATIONS: LESSONS FROMTHE MINING INDUSTRYCollaboration Between Industryand AcademeAI-Based Autonomous ControlFlowmeter Selection and Sizing

Quality Sensors at Sensible PricesAutomationDirect carries a full line of almost 4,000 sensors fromphotoelectric to limit switches, proximity, and ultrasonic. Featuredbelow are just some of the brands and styles we offer. Our sensorshave the best pricing available with fast FREE shipping on ordersover 49*. When it comes to buying sensors, it makes sense tochoose AutomationDirect.NEW! ProSense RW Series Mini RectangularPhotoelectric SensorsStarting at 44.00 (RWRT-LP-0A) Small footprint: 14 x 28 x 8mm Diffuse with background suppression,diffuse reflective, retroreflective,through-beam models Sensing distances up to 3m NPN or PNP outputsM A DE I NU S A Light-On or Dark-On function(depending on model) Complete overload protection Axial cable orM8 quick-disconnect models IP65/67 protection ratingContrinex DW Series InductiveProximity SensorsProSense PB SeriesInductive Proximity SensorsStarting at 15.50 (DW-AS-614-M12)Starting at 22.00 (PBM6-AP-1A) Available in 8, 12, 18 and 30mmdiameter housings Standard and extendedsensing distances Flush and non-flushmounting versions IO-Link available on PNP models Lifetime warrantyWenglor OPT SeriesPhotoelectric SensorsStarting at 63.00 (OPT2130) Diffuse with backgroundsuppression, retroreflective,retroreflective for transparentobjects, and through-beam models LO/DO, NO/NC outputs IO-Link compatibility Visible light spot allows easytarget set-up IP67/IP68 rated Available in 8, 12, 18 and 30mmdiameter housings Up to 15mm sensing distance Flush and non-flush mountingversions Lifetime warrantySchmersal IECLimit SwitchesStarting at 14.00 (ZS-236-02Z) Available in 30mm and 40mmbody widths Zinc alloy, aluminum or glass-fiberthermoplastic bodies 90-degree adjustable head, withlevers adjustable to any angle Snap-action contacts in a varietyof NO/NC configurationsAlso AvailableLinearTransducersIP69K RatedPhotoelectric SensorsUltrasonicSensorsResearch, price, buy at:www.automationdirect.com/sensorsOrder Today, Ships Fast!* See our Web site for details and restrictions. Copyright 2022 AutomationDirect, Cumming, GA USA. All rights reserved.1-800-633-0405the #1 value in automation

OCTOBER 2022 VOL 69, ISSUE 5FEATURESDEPARTMENTSCYBERSECURITY AND CONNECTIVITY8 Practical IIoT and Wireless NetworkPractices for Modern MiningBy Bas Mutsaers, Mark O. Harris, Joanne Sun, and Robert ZwickWireless technology, IIoT, and good cybersecurity practices can supportmodern mining and metals facilities.INDUSTRY 4.014 Increasing Edge ExpectationsBy Silvia GonzalezThe right edge platform removes roadblocks to creating innovative applications, future proofs installations, and provides a host of other benefits.OPERATIONS18 Best Practices for CollaborationBetween Industry and AcademeBy R. Russell Rhinehart, ISA & AIChE FellowBetter collaboration between academic institutions and industry practitioners can improve outcomes for industrial businesses and the schools,professors, and students they depend on.FACTORY AUTOMATION23 Case Study:AI-Based Autonomous Control6 Talk to MeIs This the Year for DigitalTransformation of Industry?By Renee Bassett26 Automation BasicsInstrumentation Lessons:Selecting and Sizing FlowmetersBy John Davis and Graham Nasby31 Association NewsDigital Transformation TrainingSeries Debuts, Certification forIIoT Component Security, ISA andIndustry IoT Consortium Partner toHelp Companies Secure IndustrialAutomation Systems, In-Situ ProofTesting of Automated Valves, NewCAPs and CCSTs, and more34 Index of Advertisers35 Final SayMentoring: Paying It ForwardEnriches YouBy Bill LydonBy Hiroaki Kanokogi, PhDAI-based autonomous control runs a semiconductor plant’sHVAC system.MAGAZINE 2022 InTech InTech, USPS # 0192-303X, is published bimonthly in Research Triangle Park, NC by theInternational Society of Automation (ISA), P.O. Box 12277, Research Triangle Park, NC 27709.ISSN 0192-303XVolume 69, Issue 5Editorial and advertising offices are at 3252 S. Miami Boulevard, Suite 102, Durham, NC 27703; phone 919-549-8411;email info@isa.org. InTech and the ISA logo are registered trademarks of ISA. InTech is indexed in Engineering Index Service andApplied Science & Technology Index and is microfilmed by NAPublishing, Inc., 4750 Venture Drive, Suite 400, P.O. Box 998,Ann Arbor, MI 48106.INTECH OCTOBER 2022 To order reprints of InTech print or digital articles, contactreprints@mossbergco.com or 800-428-3340.List Rentals: For information, contact ISA at info@isa.org orcall 919-549-8411.Subscriptions: ISA Members receive InTech as part of theirannual membership. Become an ISA Member at: http://www.isa.org/join. Other subscribers: 175 USD in North America;235 USD outside North America. Single copy and back issues:20 USD shipping.Opinions expressed or implied are those of persons ororganizations contributing the information and are not to beconstrued as those of ISA.Postmaster: Send Form 3579 to InTech, P.O. Box 12277, ResearchTriangle Park, NC 27709. Periodicals postage paid at Durham andat additional mailing office.Publications mail agreement: No. 40012611. Return undeliverable Canadian addresses to P.O. Box 503, RPO WestBeaver Creek, Richmond Hill, Ontario, L48 4RGwww.isa.org/InTech4WWW.ISA.ORG/INTECH

EDS-4000/G4000 Series Ethernet SwitchesScan the QR Codeto Learn MoreHave Questions?USA@moxa.com

TALK TO ME PERSPECTIVES FROM THE EDITORIs This the Year forDigital Transformationof Industry?OFFICIAL PUBLICATION OF THE INTERNATIONAL SOCIETY OF AUTOMATIONEDITORIALCHIEF EDITORRenee Bassett, rbassett@isa.orgBy Renee Bassett, InTech Chief EditorIndustry 4.0 and smart manufacturingaren’t just for petrochemical campuses and automotive assembly plants.Digital transformation isn’t just forfood and pharma operations. Machinebuilders, job shops, and other midsizemanufacturers may think they are toosmall, too specialized, or too ordinaryfor automation, but they are wrong.Sure, all the case studies and proofsof concept for advanced manufacturing solutions seem to come from megacompanies—or from lab-based startupsthat are somehow getting paid to flydrones or build BattleBots . But 2022may be remembered as the year whendigital tools matured, and automationfound its way to the masses. This veryreal Industry 4.0 revolution was ondisplay at IMTS 2022, the biennial tradeshow and conference put on by theAMT – The Association for Manufacturing Technology.Cancelled in 2020 by pandemicrestrictions, IMTS 2022 came roaring back into Chicago in Septemberto showcase digital manufacturinginnovations by and for machine builders. More than 85,000 registered forthe six-day show, whose theme “DigitalManufacturing. Implemented.” was ondisplay in more than 1 million squarefeet of exhibits.Nine technology pavilions showedsolutions such as multitasking machining centers, robots/cobots, and digitaltwin and manufacturing execution/workorder software. The co-located HannoverMesse USA show and conference encompassed nearly 500 of the 1,800-plusexhibiting companies and highlightedindustrial automation systems, wired andwireless networking, and much more.The advances in digital manufacturing technology on display at IMTS 2022INTECH OCTOBER 2022 put solutions within reach of small- andmedium-sized businesses and shouldamaze even industry veterans, saidPeter R. Eelman, chief experience officerat AMT. “For example, visitors can learnhow to set up and run an entry-level automation solution in 30 minutes. Computed tomography inspection systemsnow operate with almost push-buttonsimplicity, and digital twin technology isas easy to use as a favorite CNC controlor CAD/CAM program.”Greater affordability and ease of implementation for cobots, pallet changers, Industrial Internet of Things (IIoT)devices, and manufacturing executionsoftware means automation is notjust accessible to job shops, originalequipment manufacturers (OEMs), andsmall-to-medium-sized manufacturers; it is increasingly essential for theseoperations to staying competitive.“If OEMs and job shops can digitizeit, they should,” said Eelman and others.“Digital tech is the best way to increaseproductivity with an existing talentpool, control costs, make reshoring/near-shoring more attractive, reducetime to market, and respond with agility to a volatile market.”My takeaways from four days oftalking to IMTS 2022 attendees andexhibitors: Automation is power.Machine monitoring is smart. Softwarespeeds setup and changeover. Cobotsempower people, not just processes.Private wireless industrial networksare here. IIoT devices are essential andincreasingly easy to implement.CONTRIBUTING EDITORSBill Lydon, blydon@isa.orgCharley Robinson, crobinson@isa.orgJack Smith, jsmith@isa.orgSTAFF WRITERSMelissa Landon, Lynn DeRoccoART & PRODUCTIONLynne Franke, Production EditorBonnie Walker, Art DirectorJamie McLendon, Graphic DesignerColleen Casper, Digital DesignerADVERTISING & SPONSORSHIPPUBLISHERRick Zabel, rzabel@isa.orgACCOUNT EXECUTIVESRichard T. Simpson, richard@isa.orgChris Nelson, chris@isa.orgGina DiFrancesco, gina@isa.orgMEDIA KIThttps://tinyurl.com/InTechAcom2022mediakitISA MEMBER LEADERSISA PRESIDENTCarlos MandolesiPUBLICATIONS VICE PRESIDENTJoao Miguel BassaPUBLICATIONS VICE PRESIDENT-ELECTNicholas SandsINTECH EDITORIAL ADVISORY BOARDJoseph Alford, Joao Bassa, George Buckbee,Eric Cosman, Acacio Costa, Vitor Finkel,Dean Ford, Narasimha Himakuntala,Russ Rhinehart, Nick Sands, David Spitzer,Sandeep Vysyaraju, Steven ValdezThe year 2022 may well becomeknown as the year of industrial transformation. What are you doing todayto make the jump to light speed whenit comes to automation and innovation? Let me know. 6WWW.ISA.ORG/INTECH

We understand you need insightful processinformation to help you run your plant e ciently.MEASURED VALUE ADDED VALUEYou make confident decisions backed by process data anda complete portfolio of services and solutions to support you.100%of Reference Standardstraceable to NationallyRecognized Standards.Ensure compliance and increase process uptime withoptimized services Lab and field accredited calibrations (A2LA) and verificationcapabilities for flow, pressure and temperature instruments Patented, industry-expert methods to optimize your calibration plan We are a leading manufacturer of process instrumentation –uniquely qualified to verify and calibrate Our global, harmonized calibration standards provide consistentservice qualityDo you want to learn more?www.us.endress.com/calibration-usa

CYBERSECURITY AND CONNECTIVITYPractical IIoT and WirelessNetwork Practices forModern MiningBy Bas Mutsaers,Mark O. Harris,Joanne Sun, andRobert ZwickModern metals and mining companies aresophisticated and often highly automated businesses with long histories. Current macroeconomic trends and business pressures increasinglydemand that operations respond to technologyadvances, including faster and more reliablecommunications. The Industrial Internet of Things(IIoT), edge and cloud computing, 5G wirelesscommunications, and other new technology promise increased functionality, but also require newHow wireless technology,IIoT, and good cybersecuritypractices can supportmodern mining and metalsfacilities.approaches to security and daily governance toprotect the investments needed to support them.Here we share practical considerations abouthow wireless technology combined with goodINTECH OCTOBER 2022 8cybersecurity practices can support modernindustrial facilities. Our examples come from mining and metals operations but apply to modernindustrial operations of all types. Our focus is onwireless communication and IIoT, where practices are less mature, use and functionality areexpanding quite rapidly, and security practicesneed to keep up with the growing risks that thesheer volume of additional endpoints will create.Need for near-real-time dataWith sustainability increasingly guiding thecentral decision-making processes, productionfunctions, and the wider enterprise, businessesexpect communication and processing to happen efficiently and with the lowest possiblecarbon production. This translates to producingwith minimum energy consumption and withthe least impact on water demands and waterquality. Shareholders and the wider public aredemanding sound environmental, social, andgovernance (ESG) and best practices for energyefficiency.The efficiency of these processes can onlyhappen with the right data. Tracking productionto a level of trace metal specificity is being inWWW.ISA.ORG/INTECH

CYBERSECURITY AND CONNECTIVITYDDECAH-eSFigure 1. A common IIoT deployment architecture at a mining siteSource: MMIDcare of hygiene, water management, energy and power quality,and product and assay management. Without IIoT, these processes would normally be manual, slower, and less accurate.With edge computing, the data reaches decision makers morequickly. Many workflows are therefore shortened, resulting inbetter decision making and overall plant efficiency.creasingly requested for the related Scope 1, 2, and 3 reporting needs of the downstream production and purificationcompanies. Companies can address requirements for suchnear-real-time data to support business needs separately orby a combination of wired and wireless solutions.Communication can happen over hardware spread acrossthe premise, or it can move wirelessly to the cloud for bulkdata storage. IIoT devices deployed at industry sites communicate with field gateways/edge devices via an edge network(typically a wireless network). Data is collected from sensorsand systems, analyzed at the edge hub level for real-time integration, or sent to a central cloud-based service. This data isaggregated with other data and delivered for advanced dataanalytics, such as digital twin, virtual reality, and value chainoptimization (figure 1).Wireless trends in metals and miningThe use of wireless communication is already large andgrowing in mining and metals operations, often because thework is dangerous or spread over large areas. Steel is manufactured with very hot smelting processes, for example, andmany operations use robotics for productivity and safety.There is a growing interest in autonomous robotic operations, including the management of in-process inventory,because these products are heavy and hard to handle.The edge network is critical communication infrastructurethat enables fleet automation, decisionautomation, and optimization of producISA’s Mining & Metals Divisiontion processes in the pit. Through theedge network, companies manage opera- The Mining & Metals Industries Division (MMID) is one of ISA’s technical divitions and maintenance with integratedsions. It focuses on leveraging automation functionality and technology soluplanning and live fleet updates fromtions to enhance mining processes and metal production.drills, haul trucks, shovels, sensors, andWho is best served by this division? Professionals concerned with economiunmanned aerial vehicles or drones.cally and environmentally sound practices related to the extraction of metalEdge compute capacity is commonlyores, coal, cement, sand, gravel, and other minerals—and the handling, separaachieved by deploying compute/storagetion, processing, fabrication, related processes, and research and developmenthardware at the industry site data centerfor the production of finished mineral or metal products. The division alsoclose to the operation site. Data collectedcovers the iron and steelmaking industries, aluminum processing and other lightfrom IIoT devices can be processedmetals, and the production and manufacturing of metals products. Find outquickly, and real-time integration withmore by visiting the division’s page on ISA Connect (https://connect.isa.org).operational management systems takesINTECH OCTOBER 2022 9WWW.ISA.ORG/INTECH

CYBERSECURITY AND CONNECTIVITYIn secondary steelmaking, requirements for speed andcustom-made production volumes and grades are increasingly affecting efficiency, as these processes are added(through intelligent real-time scheduling) on top of brownfield applications and existing architectures, producing newsafety scenarios and challenges. This strains existing wirelesscommunications infrastructure.Mines generally have similar challenges to efficiency, as wellas multiple production- and safety-critical systems that arereliant on a consistent wireless connection. Mining continuesto increase its levels of automation, and this includes the needfor data connections to traditional (crewed) heavy mobileequipment (HME) and to autonomous or remote-controlledHME such as drills, haul trucks, excavators, and dozers.The following mine systems are typically reliant on somekind of wireless connection: operations and fleet management remote HME operations collision avoidance for mobile equipment asset health monitoring and reporting ore and grade control, drill patterns high-precision GPS for GPS corrections geotechnical monitoring fatigue monitoring of personnel underground remote equipment operation electrical power equipment monitoring and control leaching field monitoring condition-based monitoring of intelligent instruments andcontrol elements.When it comes to cybersecurity, every industrial sectorhas its own requirements, but mining and metals companiesare benefiting from the work of the ISA Global CybersecurityAlliance (https://isa.org/isagca) to advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. Secure communication is key,because mining and metals information also involves businessinformation as products change hands across the value chain.Another more local example of the need for secure communications happens when contractors who manage the pitfleet are moving material at the right grade from the pit tothe owners of the plant: If trusted information is available fordecision making, sites can realize the highest potential valueof the ore based on specific productivity key performanceindicators and other requirements.Updating a 10-year-old wireless data networkConsider the situation facing a mining operation with a10-year-old wireless data network. At this point, it is likelyat its bandwidth capacity, which limits new technologiesand upgrades to existing systems (e.g., collision avoidance,turn-by-turn dispatch directions). Besides the environmentalchallenges of dust, vibration, and other dynamics affectingINTECH OCTOBER 2022 operation of the current network, there is a risk of increasedsystem failure as the network ages, demands for performance and data rate increase, and spare parts availabilitydiminishes over time. Likely after 10 years, parts are nolonger commercially available and must be procured throughthird-party sellers.To mitigate the risk of unplanned system failure and therefore outage of several production- and safety-critical systems, management would have determined that the currentwireless system must be upgraded or replaced with fit-forpurpose wireless technology that meets current and futurebandwidth and cybersecurity needs. The new network mustadapt to the current complexity of mine topography andevolve as the mine is further developed, either in an open pitor deeper and deeper underground.Execution of the upgrade (modernization versus migration)also needs to accommodate new and updated wireless technologies to improve safety, such as systems for driver safetyand collision avoidance, upgraded fleet management, andimproved production and processing capabilities. Ideally systems are “future ready” for some of the expected innovationcurrently in pilot stages at the mine to prevent regret costs.Given these requirements, the mine site has five options:run the existing network to failure; upgrade the current meshnetwork with no changes; replace it with a hybrid mesh/LTE network; replace it with a hybrid mesh/LTE network“as a service”; or install a site-specific 5G network. Here areconsiderations for each choice.Run the existing network to failure. Pro: Low cost upfront. Cons: Potential incidents because the current networksupports safety-critical systems; increased maintenance onthe existing network with no replacement components commercially available; estimated three-week production impactsdue to network failure.Replace with latest version of current mesh networkhardware with no change. A typical wireless infrastructureprovider offers fixed wireless and Wi-Fi to broadband serviceproviders and enterprises to provide Internet access. Anexample of this is a Canopy network. Pros: Replacement systems support safety-critical systems and are often downwardcompatible; components are readily available; the overallsystem is supported by the vendor of choice; and the solution provides the easiest cutover without much additionaltraining. Cons: Inflated cost, and the system may not provideas much bandwidth as a hybrid mesh/LTE solution.Replace with a hybrid mesh/LTE network. Pro: Thereplacement system supports safety-critical systems andavoids production impacts from a network failure; addition ofLTE provides additional bandwidth; components are readilyavailable; and the system is supported by the vendor. Cons:Highest cost option; added complexity; unfamiliarity of LTEwould require training and SLA setting with the vendor.10WWW.ISA.ORG/INTECH

Man went to the moon beforeinventing wheels for a suitcase.PROVEN40YEARBATTERYOPERATINGLIFE*Don’t forget the simple things.Speak to an expert early on if yourequire a space-saving battery thatcan handle extreme environments.The load will be lighter.* Tadiran LiSOCL2 batteries feature the lowest annual self-discharge rate of any competitive battery, less than 1% per year, enabling thesebatteries to operate over 40 years depending on device operating usage. However, this is not an expressed or implied warranty, as eachapplication differs in terms of annual energy consumption and/or operating environment.Tadiran Batteries2001 Marcus Ave.Suite 125ELake Success,NY 110421-800-537-1368516-621-4980www.tadiranbat.com

CYBERSECURITY AND CONNECTIVITYReplacement with a mesh OR hybrid mesh/LTE “as aservice.” Like many platforms, hardware as a service is alsoavailable. Pros: Lower up-front cost and in greenfield sites,often a plus; good option when capital is scarce; there is areplacement system to support safety-critical systems; and theapproach avoids production impacts from failure. Cons: Requiresa long(er) term support contract and expense; network as aservice relies on a service agreement between the customerand vendor for network maintenance and managing a businesscritical system. (For this it is best if the vendor is intimate withthe challenges in OT and IT for the specific industry.)Upgrade to site-specific 5G network. Pro: Site-specific5G networks are up to 20 times faster than traditional LTEnetworks; the added speed allows the benefit of additionalconnections. Con: Additional connections means additionalcybersecurity implications that must be addressed.Additional actions/considerations for choosing among thefive options: Give network components due consideration (for likely types of scenarios) and make sure the design receives athird-party review if safety and production rely on it.Identify all details to be included in the design.Conduct a constructability review for an initial state and afuture state, as mines evolve over time.Calculate the current bandwidth requirements of all mineequipment and systems, and estimate bandwidth requirements for anticipated future technologies to produce atarget bandwidth with a suitable safety margin.Perform a proof-of-concept test for each option or caseunder consideration to ensure the system functions asadvertised in your environment. Test physical and electromagnetic functions, performance under additional security, performance beyond vendor default, and performancewhen adding potential overhead of various additionalprotocols (safety, functionality, or integration).Consider the following major priorities when comparingthe solutions: maximizing your bandwidth return relative to cost having a proven, established enterprise solution ready for mine deploymentfulfilling cybersecurity requirements, default and specificto risk profile (such as for autonomous mining)having straightforward scope/implementation requirements to minimize schedule delays of the rollouthaving a low operating cost relative to the capital cost, butmore importantly to the total cost of ownershipminimizing reliance on the vendor for support for servicing as well as achieving a service level in response to thespecific needs for the site. The Information TechnologyInfrastructure Library (ITIL) foundation provides a goodframework to consider the details of service functions inIT and OT.INTECH OCTOBER 2022 IIoT security considerationsIIoT devices leverage wireless technologies such as LTE, 5G,and Wi-Fi. They also leverage cloud technologies for analyticsand storage, and low-power-consumption technologies foroperational longevity. These technologies allow IIoT devicesto be widely adopted in mining sites supporting autonomousmining or other processes. However, IIoT devices often havesignificant cybersecurity vulnerabilities to security threats.Cyber threat actors frequently exploit security vulnerabilities in IIoT devices. A mining company faces different threatactors depending on its profile. Many mining companieshave assets worth multiple billions of dollars, and many ofthese assets operate critical infrastructure, such as water andpower supplies. Mining companies have exploration knowledge about future mining assets that, for example, influencesdecisions about adjacent infrastructure investments. Hence,various motivations attract intense interest from differentcyber threat groups, including nation states, cyber terrorists,or even disgruntled employees.Either external or internal threat actors can exploit a widerange of vulnerabilities in IIoT solutions, and the impact canseriously damage physical assets and risk the health andsafety of people. For example, bad actors can hack the sensors used to monitor tailings dam water levels and maliciously change readings to be lower than the actual ones. Thiscan delay or prevent an emergency response to a spill of thetailings water, resulting in damage to the environment andpotential loss of human life.Another example of an IIoT cyber threat target is the sensors used for stockpile slope monitoring. Sensors are commonly used to monitor the angle or stability of large stockpiles of different materials. If the stockpile slopes cannot bemonitored correctly due to hackers intentionally changingthe sensor data in the monitoring system, the stockpiles cancollapse. This can cause production delays, financial loss,equipment damage, and loss of human life.Common IIoT device vulnerabilities include: Hardware devices that are unmanaged: No device registra-tion, tracking, compliance monitoring, or access control. Hardware and software versions that are out of date com- 12bined with versions of operating systems and applicationsthat are no longer supported, leaving significant exposure.No endpoint protection, which makes the devices vulnerable to malware infection.Communication channels that are unencrypted or have noor weak authentication or are using unsecured protocols.Network IIoT devices connected to untrusted networks orthe IIoT exposed to the Internet without proper securityprotections.Unprotected data in transit and storage, exposing sensitive or critical data either at rest or in transit.Unsecured IIoT services running either on premise or in thecloud.WWW.ISA.ORG/INTECH

CYBERSECURITY AND CONNECTIVITY Increased exposure of critical IIoT through connected andconverged IT/OT infrastructure. Software as a service (SaaS) with no segregation of customer data and unsecured cloud services. Vendor implementations have varying levels of security and are oftenopen (not secure) by default. The supply chains are not well secured due to history andmissing government practices on how third-party-suppliedsoftware/firmware/hardware should be secured. The lack of physical access control for installed IIoT devices.Protecting the IIoT environment is only possible by minimizing IIoT vulnerabilities and reducing potential risks. Cybersecurity is not just a technology challenge. It is

email info@isa.org. InTech and the ISA logo are registered trade-marks of ISA. InTech is indexed in Engineering Index Service and Applied Science & Technology Index and is microfilmed by NA Publishing, Inc., 4750 Venture Drive, Suite 400, P.O. Box 998, Ann Arbor, MI 48106. To order reprints of InTech print or digital articles, contact

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

requirements for safety instrumented systems (SIS), a new edition of the IEC 61511 international standard was published. Recently published, ANSI/ISA 61511-1 brings the ISA standard into complete alignment with IEC 61511-1. This paper will review ten major themes of change between ANSI/ISA 84.00.01 and ANSI/ISA 61511-1. 1 Introduction

1) ISA-5.1 -Instrumentation Symbols and Identification. 2) ISA-5.2 -Binary Logic Diagrams for Process Operations. 3) ISA-5.3 -Graphic Symbols for Distributed Control/Shared Display Instrumentation, Logic, and Computer Systems. 4) ISA-5.4 -Instrument Loop Diagrams. 5) ISA-5.5 -Graphic Symbols for Process Displays. 6) ANSI/ISA-7.00.01 -Quality .