IEC 61850 SCL File Types Explained: ICD, SSD, SCD, IID, CID, and SED

If you work with IEC 61850, you will deal with SCL files. They are the standard way to describe IED capabilities, substation configurations, and communication parameters. But the first thing that confuses most engineers is this: there are six different SCL file types. ICD, SSD, SCD, IID, CID, SED — each with a different purpose, created by a… Read More »

Zakaria El Intissar

How to Set Up IEC 60870-5-104 for SCADA Remote Monitoring

IEC 60870-5-104 (commonly called IEC 104) is the standard protocol for SCADA communication in power utilities, water systems, and other critical infrastructure across Europe, Asia, and the Middle East. It takes the application layer of IEC 60870-5-101 (the serial telecontrol standard) and maps it onto TCP/IP. This gives you the same proven data model — single-point indications, measured… Read More »

Zakaria El Intissar

IEC 61850 Security: Threats, IEC 62351, and How to Protect Your Substation

IEC 61850 transformed substation automation. It replaced hardwired copper connections with standardized Ethernet-based communication between intelligent electronic devices (IEDs). GOOSE messages trip breakers in under 4 milliseconds. MMS connects IEDs to SCADA systems. Sampled Values stream real-time voltage and current measurements. But this transformation came with a trade-off. By moving protection and control communications onto Ethernet, substations inherited… Read More »

Zakaria El Intissar

Modbus Security Risks and How to Protect Your Industrial Network

Modbus was built in 1979 for a world where industrial networks were physically isolated. There was no internet, no remote access, and no reason to worry about authentication or encryption. The protocol was designed for reliability and simplicity — not security. That was fine for decades. But today, industrial control systems are increasingly connected to corporate networks, cloud… Read More »

Zakaria El Intissar

How to Set Up Modbus TCP/IP Communication: Step-by-Step Guide

Modbus TCP/IP brings the simplicity of the Modbus protocol onto modern Ethernet networks. Instead of serial cables and RS-485 wiring, you use standard Ethernet infrastructure — switches, routers, and Cat5e/Cat6 cables. The protocol works the same way as Modbus RTU at the application level. You still read holding registers, write coils, and use the same function codes. The… Read More »

Zakaria El Intissar

How to Configure Modbus RTU Over RS-485: Step-by-Step

Modbus RTU over RS-485 is the most common serial communication setup in industrial automation. It connects PLCs, sensors, drives, meters, and other field devices on a simple two-wire bus. The protocol itself is straightforward. But getting it to work reliably depends on getting the details right — wiring, termination, addressing, baud rate, parity, and register mapping all need… Read More »

Zakaria El Intissar

How to Configure DNP3 Communication Between Master and Outstation

If you work with SCADA systems in the electric, water, or oil and gas sectors, chances are you will deal with DNP3 at some point. It is one of the most widely deployed protocols for communication between control centers and field devices. But configuring DNP3 properly is not always straightforward. There are multiple layers to set up, addresses… Read More »

Zakaria El Intissar

IEC 62443 Explained: Complete Guide to the Industrial Cybersecurity Standard

IEC 62443 is a series of international standards that tell you how to secure industrial automation and control systems (IACS) from cyber threats. It covers everything — from the words you use to describe security, to how you build a security program, to the specific technical requirements your systems must meet. The standard was created by ISA (the… Read More »

Zakaria El Intissar

Industrial Cybersecurity: How to Protect OT, ICS & Critical Infrastructure (2026)

Industrial cybersecurity is the practice of protecting the systems that run factories, power plants, water treatment facilities, and other physical operations from digital threats. These systems go by many names — operational technology (OT), industrial control systems (ICS), or SCADA — but they all share one thing: they control real-world processes where a cyberattack can cause physical damage.… Read More »

Zakaria El Intissar