Charlotte Stonestreet
Managing Editor |
Home> | AUTOMATION | >Security | >Things ain't wot they used to be |
Things ain't wot they used to be
23 June 2015
The exploding number of connected devices means that Internet connectivity and services are being added into devices not originally intended for the purpose. Not only are HUGE amounts of data generated, but it this makes them vulnerable to being attacked, remotely disabled, or compromised in some other undesirable way – each scenario seriously threatening to any business...
In the past, product developers would rely on the fact that their devices were too few and too uninteresting to hackers to attempt to exploit them. Unfortunately, these once "no interest" devices will become quite tempting as targets for exploit.
Historically, the plant floor and the enterprise have remained separate domains. However, the convergence of enterprise IT and the industrial network means a hacker could wreak havoc in a company’s ability to manufacture. Therefore, it is important to build a bullet-proof security scheme when converging IT and plant floor networks, covering everything from protocols to port physical security. A firewall at the OT perimeter (or the Internet perimeter, for that matter) is simply insufficient to adequately protect the control network. Experience has shown that there are multiple pathways to the control system, opening up ICS to both malicious and accidental cyber incidents.
Single source
Many industries are still in the "very early” stage of ICS security expertise. Having a one-stop source for cyber security services and solutions makes it easier to improve defences. Belden has recently teamed up with Securicon to provide a single source for companies who need both services and technology in order to improve their industrial cyber defences.
"Engineers not specialising in cyber security often throw their hands up at security, it’s not what they do,” says Pat Differ, director of sales at Securicon LLC, a consulting firm specialising in cyber security services and solutions for critical infrastructure industries. "The result is they may end up relying heavily on IT-oriented or recommended solutions that are not meant for industrial applications. For example, it is important to take into account the harsh environment, high speed switching and insecure-by-design protocols that are characteristic of plant infrastructure.”
Rockwell Automation and Cisco have developed a model logical network architecture - Converged Plant-wide Ethernet (CPwE) - that safely merges the two standards-compliant Ethernet networks. It is a set of best practices that extends to the physical layer.
One of the most prevalent examples of the need for security is the smart grid: as information on the grid becomes more accessible, so does the damage a security breach can inflict. The new system has to integrate not only with the original system but also all of the other systems.
Automation software specialist COPA-DATA specialises in industrial automation software for the energy sector to help companies comply with the IEC 61850, IEC 60870 standards, used to communicate to both field level and to superordinate systems. The DNP3 protocol is an open communications protocol ideal for use with facilities that are distributed over a wide geographic area.
Zenon Energy Edition supports substation automation and distribution management, grid control technology and wind park management, using SCADA systems to manage, monitor, control and protect Smart Grids.
Monitoring oil and gas field installations, pipelines, and other widely distributed facilities relies on satellites and other platforms for transmitting data. In addition to eliminating delays and achieving high quality communications, facility operators need to reduce costs by limiting the volume of data that needs to be transmitted.
Yokogawa Electric is releasing an enhanced version of its Stardom network-based control system, specifically targeted at upstream oil and gas development and production, aimed at reducing communication costs and ensuring highly reliable monitoring and control. Stardom network-based control systems consist of FCN/FCJ autonomous controllers and either a VDS or FAST/TOOLS SCADA server.
Key Points
- The convergence of enterprise IT and the industrial network means a hacker could wreak havoc in a company’s ability to manufacture
- There are multiple pathways to the control system, opening up ICS to both malicious and accidental cyber incidents
- Having a one-stop source for cyber security services and solutions makes it easier to improve defences
- NMi Group acquires TrustCB
- Amazon invests €400m+ in cutting-edge robotics
- AI-powered design for industrial processing equipment
- Hitachi, Fanuc and AI startup to form automation joint venture
- Open robotic control software platform
- 'Flexoskeletons' mean insect-inspired robots are faster & cheaper to make
- Integrated Industry at Hannover Messe 2013
- Siemens UK awarded Cyber Essentials Plus (CE+) certification
- UK manufacturers face historic need for automation
- Twenty new EU robotics experiments start development phase
- Insight Into Security Threats
- Secure Network Interoperation
- SAFETY & SECURITY - STRANGE BEDFELLOWS
- Siemens extends TIA Portal engineering framework
- Partnership To Enhance Industrial Control Systems Security
- GAMBICA forms industrial network security group
- Infosecurity: stop throwing rocks at each other
- Secure data handling process
- Rising risk of cyber security attacks
- Scalable safety integration for small applications