Plant Security: From Assets to iPhones

View Comments: Newest First|Oldest First|Threaded View
User Rank
Security post.
Brandy   9/1/2015 3:03:21 AM
Security is important. Network and plant security is not an exception. I would like to thank for the post. It was good to know. I like getting to know new things. I hope what I have to share will be much in help for those ones who seek for help in this area meaning assistance with studies online. do my essays You are welcome!

User Rank
bobjengr   8/9/2014 1:48:55 PM
1 saves
Excellent point about the need for continuous updates when using systems aimed at providing IT to the factory floor.  I would also include daily back-ups of data and storage on servers dedicated solely to that purpose.  During my time with GE, we frequently needed data to provide input for Six Sigma exercises and to calculate the capability of processes within the various factories.  We would take data from all three shifts to get a feel for any loss of quality over a 24 hour period of time.  Loss of data became a real problem for us and basically required starting over with investigations.  In today's world, in-plant security is probably much more important that mere loss of data.  Any attempts to strengthen security are definitely welcomed.  Excellent post Rob.

User Rank
Plant Security - General
jcbond_mi   8/8/2014 1:52:18 PM
This article really just touches the surface of this issue.  Plant security is really a big, difficult, and, in some ways, frightening subject.

Most people have heard of Stuxnet, the virus used to attack the Iranian nuclear enrichment facility at Natanz.  Near as most people can guess, this was a combined effort on the part of at least one government and one or more private companies.  BUT -Stuxnet is still around.  other users have adapted it.  Other viruses have been created.  The problems are several.

1.  Factory control has a different paradigm for networking than outside IT.  The priority is that everything works, and if anything fails, it can be quickly remedied.  Maybe another way to put it is that the data networks are simple to understand and easily back-doored.  There is little in the way of native security, since this can be an obstacle to recovery.

2.  Factory control networking was, up until recently relatively obscure and untested. The security was by a combination of obscurity and what was though to be a lack of connection to the outside world.  Totally impractical, considering that Stuxnet's primary infection mode was tossing infected USB thumb drives into the facility's parking lot, thereby infecting programming terminals.  the example given of someone plugging in their phone/personal device and infecting a production network happens.  A lot.

3.  These systems are used to control things we care a whole heckuva a lot about:  Water/Wastewater treatment for example.

4.  These systems have long update times, and users are loathe to make updates without clear and compelling reasons to do so.  See note 1;  you don't make changes lightly to a working system that is running 24 hours a day, 7 days a  week, all year (with maybe a short specified maintenance interval).  So much of what is currently making cars, pumping oil, and manufacturing medical equipment is pretty doggone old.

Things are beginning to change, but it's slow.  There is a joint IEC/IEEE committee working on a standard for industrial security;  when that actually come out is when I predict we will see widespread change.  Where there are security standards, companies will follow - or face shareholder lawsuits for negligence, and maybe an inability to get insurance for a facility unless it is 'up to code'.

Rob Spiegel
User Rank
Re: I had no idea that plants are facing that many threats
Rob Spiegel   8/6/2014 10:21:04 AM
Great idea, James. Breaches can really slam a company. Target took a huge stock price hit yesterday, which was viewed as further fallout from its breach a few months ago.

User Rank
I had no idea that plants are facing that many threats
jamesshaffer85   8/6/2014 10:14:31 AM
I had no idea that plants are facing that many threats. But now I totally agree with you that all of them deserve serious consideration. I'm going even to order a custom term paper on this topic from place4papers.com, the leading research paper writing service in its field.

Partner Zone
More Blogs
Using 3D-printing to integrate electronics is an enthralling idea, but there's a long road ahead to commercialization.
Prime Minister Narendra Modi is seeking help from Tesla Motors' Powerwall technology for solar-energy storage in India.
The September release spotlights Autodesk's long-term strategy for provisioning of its CAD, CAM, and CAE software and its commitment to cloud delivery.
The transformative nature of designing and making things was the overarching, common theme at separate conferences held in Boston by two giants in the PLM space: Autodesk, with its Accelerate 2015, and Siemens’s Industry Analyst Conference 2015.
Innovations such as “scrum” and virtualization methods have changed the project management game.
Design News Webinar Series
10/1/2015 11:00 a.m. California / 2:00 p.m. New York
9/10/2015 11:00 a.m. California / 2:00 p.m. New York
8/13/2015 11:00 a.m. California / 2:00 p.m. New York
6/25/2015 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 5 - 9, Standards for the Internet of Things (IoT)
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7

Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service