Patching for Industrial Cybersecurity Is a Broken Model

View Comments: Oldest First|Newest First|Threaded View
<<  <  Page 2/2
User Rank
bobjengr   4/27/2013 12:08:48 PM
 Very informative Al--great post.   I'm not a programmer by any stretch of the imagination but I have wondered why programmers don't incorporate virus protection as an embed to the programs they write.  (NOTE: Maybe they do but I'm not aware of it.)  We depend upon external programs; i.e. Norton, AVG, Symantec, McAfee, etc. to provide protection but these are not always effective and must be upgraded frequently, sometimes weekly.  Also, are there any programs that will interrogate the IP address of the hacker or sender?  Again, very informative.


User Rank
Essence of the problem
GeorgeG   6/14/2013 9:38:42 AM
I'm surprised there hasn't been more traffic on this post. Perhaps that's an indication of the problem. As the post suggests, security must be structure, not veneer. The notion of a security patch is akin to the notion that you can fix a leak in the basement with a bit of caulking.

As the old saying goes 'it's all fun until someone loses an eye'. Even when a control system performs as intended, there's some chance of safety failures. However, a system cannot be considered safe unless it is rendered immune to external influences yet most integrators and users feel comfortable with a poorly thought out Maginot line of defence. In general, integrators and, worse, control system component suppliers (hardware and software) prefer to be agnostic to security issues expecting someone else to somehow provide an adequate defence - this has got to change. Many are the times I've sat through a presentation for an object/tag oriented controls package where the entire emphasis is on how easy it is to 'see' data and how easy it is to implement changes; so often, object manipulation is devoid of any semblance of change management or even basic validation of parameters: can you configure an unstable condition on a servo axis (what's stopping you)? Can you do it while the equipment is running? How much basic authentication is required?          

<<  <  Page 2/2
Partner Zone
More Blogs
Clearly, zombies are in this year -- taking over from a decade of vampire dominance in Halloween fashion.
Researchers in China have developed a battery with self-healing electrodes that makes it resistant to cracking, leaking, or just plain breaking.
The IoT will bring us the many positives of AI, evolving our technologies in ways that only a few years ago seemed like science fiction, according to ARM’s buyer.
Both traditional automation companies and startups are developing technologies to improve processes on the factory floor, while smart sensors and other IoT-related technologies are improving how products are handled during transport and across the supply chain.
Remote monitoring now looks beyond the individual motor or conveyor and instead views the process from end to end.
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 10 - 14, Embedded System Design Techniques™: Getting Started Developing Professional Embedded Software
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7 | 8 | 9 | 10

Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Course September 27-29:
Sponsored by 3M
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Technology Marketplace

Copyright © 2016 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service