This paper discusses the significance of considering cybersecurity threats during a PHA/HAZOP. A step-by-step and systematic technique is presented to show how a PHA team could assess the vulnerability of a system or facility to potential cyber threats, analyze adequacy of safeguards, and develop necessary countermeasures to resist cyberattacks.
Tags
Distributed Control System
Cybersecurity
Process hazard analysis
Cyberattack
Malware
Date
June, 2019