HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

Patching for Industrial Cybersecurity Is a Broken Model

NO RATINGS
View Comments: Oldest First|Newest First|Threaded View
<<  <  Page 2/2
bobjengr
User Rank
Platinum
PATCHING FOR CYBERSECURITY
bobjengr   4/27/2013 12:08:48 PM
NO RATINGS
 Very informative Al--great post.   I'm not a programmer by any stretch of the imagination but I have wondered why programmers don't incorporate virus protection as an embed to the programs they write.  (NOTE: Maybe they do but I'm not aware of it.)  We depend upon external programs; i.e. Norton, AVG, Symantec, McAfee, etc. to provide protection but these are not always effective and must be upgraded frequently, sometimes weekly.  Also, are there any programs that will interrogate the IP address of the hacker or sender?  Again, very informative.

 

GeorgeG
User Rank
Platinum
Essence of the problem
GeorgeG   6/14/2013 9:38:42 AM
NO RATINGS
I'm surprised there hasn't been more traffic on this post. Perhaps that's an indication of the problem. As the post suggests, security must be structure, not veneer. The notion of a security patch is akin to the notion that you can fix a leak in the basement with a bit of caulking.

As the old saying goes 'it's all fun until someone loses an eye'. Even when a control system performs as intended, there's some chance of safety failures. However, a system cannot be considered safe unless it is rendered immune to external influences yet most integrators and users feel comfortable with a poorly thought out Maginot line of defence. In general, integrators and, worse, control system component suppliers (hardware and software) prefer to be agnostic to security issues expecting someone else to somehow provide an adequate defence - this has got to change. Many are the times I've sat through a presentation for an object/tag oriented controls package where the entire emphasis is on how easy it is to 'see' data and how easy it is to implement changes; so often, object manipulation is devoid of any semblance of change management or even basic validation of parameters: can you configure an unstable condition on a servo axis (what's stopping you)? Can you do it while the equipment is running? How much basic authentication is required?          

<<  <  Page 2/2
Partner Zone
More Blogs
A Finland-based company has introduced what it claims is the first smart door lock that can be powered from energy harvested from a mobile device.
This charts show the pros and cons of five drive-train technologies.
A UK-based consortium comprised of the Centre for Process Innovation, Merck, and Polysolar are working on a design for integrated photovoltaic windows.
A researcher from The Ohio State University has designed objects that harness vibrations from the movement of swaying buildings or bridges to provide alternative energy.
Members of the IEEE Computer Society name cybersecurity as the top technology affecting their industries.
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Jan 11 - 15, Designing ARM Devices Using Segger Tools
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7 | 8 | 9


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Technology Marketplace

Copyright © 2016 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service