Principles of IT security in light of new regulations

Journal Title: Mining – Informatics, Automation and Electrical Engineering - Year 2017, Vol 532, Issue 4

Abstract

In many places, the new regulations on the detailed requirements of underground mining operations introduced by the Minister of Energy on November 23, 2016, obligate the head of a coal mine to specify the detailed rules of implementation of the recommendations contained therein. This article is a review of the available IT security solutions recommended by the author for the technical implementation of the protection of SCADA systems. The solutions described here may be adopted as IT security regulations in coal mines.

Authors and Affiliations

Zenon Leks

Keywords

Related Articles

About requirements for diesel drives used in hard coal mine underground workings

Due to the rapid increase of using transportation machines with diesel drives in hard coal mine underground workings, the technical and operational requirements for these drives are analyzed. The ambiguity of the Europea...

Impact of voltage dips on the operations of a high-power synchronous motor with a reactive power Controller

The article presents the impact of voltage dips on the operations of a synchronous motor in the state of synchronism. The following characteristics were determined: static characteristics of the load angle depending on p...

Selected terms used in ”mining telecommunications”

At the beginning of the paper the author pointed out that in many publications which describe technical solutions applied in telecommunications systems and devices for underground mines there are terms which belong to th...

Miniature ball contact sensor for locating singular points of a control magnetic field

The article presents the results of research (obtained by use of a specially developed contact sensor) regarding the completion of singular points of the spatial magnetic field for selected systems of miniature relays co...

Selected issues of identifying dynamic properties of hard coal flotation process

The article features selected issues related to the identification of dynamic properties of the hard coal flotation process, as an object with one control input and one output. The content of ash in flotation tailings, a...

Download PDF file
  • EP ID EP297568
  • DOI 10.7494/miag.2017.4.532.49
  • Views 130
  • Downloads 0

How To Cite

Zenon Leks (2017). Principles of IT security in light of new regulations. Mining – Informatics, Automation and Electrical Engineering, 532(4), 49-54. https://europub.co.uk/articles/-A-297568