HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

Hackers at Your Gate

NO RATINGS
View Comments: Threaded|Newest First|Oldest First
naperlou
User Rank
Blogger
truly a problem
naperlou   11/14/2013 9:40:13 AM
NO RATINGS
Rob, this truly is a problem.  It is also probably a result of plants opening up and using technologies that, in the past, were not typically used. 

On the other hand, the things you mention are really different in scale and scope.  It is one thing to worry about losing intellectual property.  This can happen anywhere, in any business.  The approach to deal with this is common to a lot of industries.  The remedies in this case are well understood.

What would concern me more is the operational side.  Now that operational systems (e.g., plant control) are being linked with IT systems to create a more efficient enterprise, the new threat is a disruption of operations, perhaps resulting in injury and major damage to equipment.  That is a whole other world. 

Rob Spiegel
User Rank
Blogger
Re: truly a problem
Rob Spiegel   11/14/2013 11:03:28 AM
NO RATINGS
Yes, Naperlou, this is a new -- and apparently growing -- problem. The notion of cyber attack that is designed to cause harm is disarming. The folks from Rockwell wer wise to team up with Cisco on this problem rather than trying to gain security expertise on their own.

Hellmut Kohlsdorf
User Rank
Gold
Re: truly a problem
Hellmut Kohlsdorf   11/15/2013 9:02:57 AM
NO RATINGS
Thanks to Edward Snowden the rest of the world has put cyber security high on the agenda

From my days working for a couple of US semiconductor names I do remember i.e. Smart cards did have to fullfill the requirement by the UK goverment to have a backdoor. I guess the same opens the dor in all other ICs as well for NSA and similar. This makes any security sheme that might be applied worthless for at least a couple of sources of cyber attacks.

I fully agree on the kind of attacks that might hit given by the author, but would like to add the view from a not US person.

As the US goverment sees industrial spionage to be a legitimate goal of cyber attacks by its spionage organisations, the backdoors addressd above mean that any system in contact with the internet is not protected against industrial spionage to the benefit of US companies. For fairness it is to say that at least the US industry needs to protect itself from russian and chinese industrial spionage and hopefully the backdoors are not known to them, hard to belive!

Cyber attacks from terrorist and criminal sources will get more proficient over time, but there might be any time people with lower ethic standards than edward Snowden taht might pass the information about backdoors to those entities.

if we keep in our minds the future with "Industry 4.0" and "IoT", combined with the thoughts presented earlier...

From a european point of view we need to invest in our one Internet infrastructure, we need to finalize our own GPS equivalent and we need to have 100% european sources for hardware and software to deal with protection against cyber attacks of any kind! I do remember when working with a german semiconductor spin off, that the very simple rule applied was: No interface with the cloud of any way or at any time on systems dedicated to R&D!

But it is my estimation, that both IoT and Industry 4.0 will need to resolve the insecurity by default or their future in some places of the world is in question!

Ann R. Thryft
User Rank
Blogger
Re: truly a problem
Ann R. Thryft   11/15/2013 12:03:54 PM
NO RATINGS
Unfortunately, I think Lou is right: as soon as what were completely closed-loop (in the comm sense) systems in the factory were opened up and joined to the front-office Ethernet systems, this became a potential hacking hazard. Before that, those systems were unreachable and thus entirely secure from cyber attacks (if not from other types). It seems like a very high price to pay.

Zippy
User Rank
Platinum
Re: truly a problem
Zippy   11/15/2013 12:17:22 PM
NO RATINGS
Assante said it up front:  the key to cyber security is people.  New technology makes hacking easier, but careless or unaware people are a much bigger problem.  The guy who dragged the Trojan horse inside the gates of Troy is alive and well and working in your factory!   :)

Bryan Goss
User Rank
Gold
Been there
Bryan Goss   11/15/2013 12:34:45 PM
NO RATINGS
I run my business from a home office, and have already had to
deal with cyber-attacks. I started getting what looked like spam emails trying to sell me teen girl cloths. Not being interested I pressed the Unsubscribe button, at which point something loaded on to my system. That was a bad mistake. I then started noting files in my shared directories that even after I deleted them they would come back, and even after I pulled the internet connection wire they would come back. I did some internet searching on the files names and confirmed that I had a virus. My solution to this was to buy a cheap windows 8 computer to use for all things internet, and have never reconnected the other computer to the internet. The one with the virus still runs slower then it should, and no scanning software I can find has been able to clean it. After my experience, I have come to believe that the only secure computer is one that has no internet connection. 


Rob Spiegel
User Rank
Blogger
Re: Been there
Rob Spiegel   11/15/2013 2:56:12 PM
NO RATINGS
I'm afraid you're right, Bryan, about the only safe computer is one that is not connected to the internet. The problem for plants these days is that they connect outside to the business network or to remote monitoring functions. Thus, it's open to the internet.

Charles Murray
User Rank
Blogger
Re: Been there
Charles Murray   11/15/2013 6:32:16 PM
NO RATINGS
Mitt Romney's presidential campaign handlers apparently agreed with you, Rob. TIME Magazine this week explained that Romney's campaign office last year had a "clean room" that was not connected to the Internet. "Because the Romney campiagn's servers were under continual assault by Chinese hackers, the computers in the clean room were not connected to the Internet."

Rob Spiegel
User Rank
Blogger
Re: Been there
Rob Spiegel   11/15/2013 7:20:12 PM
NO RATINGS
Wow. What on earth would the Chinese want to see on Romney's computers?

OLD_CURMUDGEON
User Rank
Platinum
Re: Been there
OLD_CURMUDGEON   11/18/2013 12:40:07 PM
NO RATINGS
Glad I still have several working MS-DOS PCs at home, including a DELL 486/33 w/ a MADE in USA sticker on the front panel!!!

Bryan:  You have an option which has worked for us.  Bring your infected PC to a reliable & professional PC repair facility.  They can extract all your data, then format the drive & replace WINDOWS with all the latest security updates.  We've done this with several PCs that have become infected, but we're still using XP PRO PCs throughout the company.

Of course, you have to be responsible for all the applications software installed.  Hopefully you have the CDs or licenses, so you can download the latest versions.

These repair facilities seem to have a whole catalog of "sniffing" software that can sniff out the most "secure" malware that is on the PC.  It's worth a try.

Bryan Goss
User Rank
Gold
Re: Been there
Bryan Goss   11/18/2013 1:56:56 PM
NO RATINGS
My infected computer is not running so bad that I have wanted to spend the $ on getting it fix, and even if I did, I would not want it connected to the internet agian anyway. Everyday I get at least 3 to 4 emails that I suspect are hackers and 1 or 2 that I know are hackers. All it takes is one wrong move and there we go again. I am almost thinking of getting a third computer for email only, so that the hackers will not be able to mess up my UPS account which also needs the internet.

 

On a side note have you all noted the home security systems that you can access with your smart phones. I am just waiting on how bad that is going to be attacked by hackers. They will not only be able to watch us in our homes, but know when we have gone on vacations, be able to unlock the doors and turn off the system by themselves. I plan on NOT getting one of those security systems.

OLD_CURMUDGEON
User Rank
Platinum
Re: Been there
OLD_CURMUDGEON   11/18/2013 2:18:36 PM
NO RATINGS
All our PCs at the company are "protected" by MICROSOFT DEFENDER & SECURITY ESSENTIALS.  We also use SPYBOT, MALWAREBYTES & AVG Suite.  Although I'll tell you that the AVG suite worked OK in previous releases, but the latest release really seems to have affected WINDOWS XP PRO.  The machines have been professionally scanned & have come back "clean", yet the filtering that AVG does really inhibits quick responses from legit corporate websites, etc.  A couple of the PCs have had the AVG suite removed, and they now operate much quicker.  It certainly COULD be NOT a fault of the AVG per se, but that it interferes w/ the MICROSOFT products.

P.S.  Our service company charges a flat fee of $50. to do a scan & clean a PC, so we consider that a very small price to pay to continue getting the benefits of modern computing.

Bryan Goss
User Rank
Gold
Re: Been there
Bryan Goss   11/18/2013 2:32:50 PM
NO RATINGS
Be careful! My computer was protected by MICROSOFT DEFENDER & SECURITY ESSENTIALS when it got the virus, and yes it was up to date. And no it could not clean it. Nor could any of the spybot or malware programs I already had on the system. It was not an unprotected computer yet it was still became infected.

Rob Spiegel
User Rank
Blogger
Re: Been there
Rob Spiegel   11/18/2013 6:02:41 PM
NO RATINGS
Yes, that's the scary part, Bryan. I think Rockwell has done itself a favor by teaming up with Cisco. They're wisely admitting they can't take care of this themselves.

a.saji
User Rank
Silver
Re: Been there
a.saji   11/30/2013 11:24:25 AM
NO RATINGS
@Rob: Scary indeed. Im not sure why they said like that because that will lose some customer base since customers do feel a bit in-secure to deal with them                                 

bobjengr
User Rank
Platinum
HACKERS
bobjengr   11/30/2013 8:50:17 AM
NO RATINGS
Bryan--I can certainly echo your comments.  I recently took my system (business computer) to have the entire disk scrubbed due to "malware" and successful attempts to hack my data.  I also had virus protection and really try to keep my software up to date.  Updates are programmed and accomplished every week and still I seem to have frequent problems.  I use a local company for all of my IT work.   They charge $145.00 a pop.  Worth it--yes, but it's time consuming and I'm offline about two to three days every time I have to have the process completed.

 

Rob Spiegel
User Rank
Blogger
Re: HACKERS
Rob Spiegel   12/2/2013 8:44:45 PM
NO RATINGS
Bobjengr, you cen probably multiply your experienmce by a few million. This is no small matter, especially when you're talking about plants.

bobjengr
User Rank
Platinum
HACKERS
bobjengr   11/30/2013 9:04:27 AM
NO RATINGS
Excellent post Rob and oh so true.   I retired from GE Appliances and you would not believe the lengths (and money spent) trying to avoid illegal intrusions.  There are passwords upon passwords required and even then, issues.  I write training modules for PDHonline.org and even with those I have had attempted "hacks".    I think these hackers just work to see if success can be had.  And the advertisements!!  One thing that really bugs me, and these are not hackers, is purchases online in which completion requires noting your e-mail address.  After that, they never go away. Your article points out great and ongoing concerns relative to security.  Security is one reason I do not use the "cloud".  Great post. 

a.saji
User Rank
Silver
Re: HACKERS
a.saji   11/30/2013 11:21:02 AM
NO RATINGS
@bob: Yes in everywhere its there. There are so many imposters. Most of the time we do get caught to them. Some do act in a manner where nobody can recognize or even think bad of it.                                 

Partner Zone
More Blogs
Here's a variety of views into the complex production processes at Santa's factory. Happy Holidays!
The Beam Store from Suitable Technologies is managed by remote workers from places as diverse as New York and Sydney, Australia. Employees attend to store visitors through Beam Smart Presence Systems (SPSs) from the company. The systems combine mobility and video conferencing and allow people to communicate directly from a remote location via a screen as well as move around as if they are actually in the room.
Thanks to 3D printing, some custom-made prosthetic limbs, and a Lego set, one lucky dog and a tortoise has learned new tricks.
With Radio Shack on the ropes, let's take a memory trip through the highlights of Radio Shack products.
Computer security firm Norton has partnered with clothing company Betaband on a pair of jeans that will keep your RFID-tagged credit cards and documents safe from wireless theft.
Design News Webinar Series
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
12/10/2014 8:00 a.m. California / 11:00 a.m. New York
11/19/2014 11:00 a.m. California / 2:00 p.m. New York
11/6/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  67


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service