1 / 5

Supervisory Control and Data Acquisition (SCADA) Software

Supervisory Control and Data Acquisition (SCADA) Software. Supervisory Control and Data Acquisition (SCADA) Software. The next generation of Data Acquisition, User login activities tracking and System Control Software. The system can data log: # of cycles Transfer error logging

judyo
Download Presentation

Supervisory Control and Data Acquisition (SCADA) Software

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Supervisory Control and Data Acquisition (SCADA) Software

  2. Supervisory Control and Data Acquisition (SCADA) Software • The next generation of Data Acquisition, User login activities tracking and System Control Software. • The system can data log: • # of cycles • Transfer error logging • Daily, monthly, annual reports • User Log in information • User ID • Date and time they log on and off • System access information. • UP-TIME, MTBF, MTTR, MTBA • Preventative Maintenance Notification

  3. User login and activities tracking • User Login, Tracking by Name and User ID • Software has a security module that mandates User login and tracks activities of users. The login module allows the setup of floor administrators that can manage accounts but not change other aspects of system security. This feature allows the system to act as a data collector for not only processes but user actions such as changes to system configuration that can be written to the audit logs. Security related events related to logins are recorded in the login security module.

  4. User login and activities tracking A sample audit log follows. Available formats are text and SQL, others may be added: The program allows for review of audit logs in a sort able database screen before dumping the logs so that patterns can be identified and for quick review of certain high priority or important events.

  5. System Control Software • Maintenance Modes • Maintenance mode settings in the system can be password protected through the optional login security manager and allow integration of user access to all screens and can control access to individual graphical objects on the user interface.

More Related