<<  <  Page 2/2
User Rank
bobjengr   4/27/2013 12:08:48 PM
 Very informative Al--great post.   I'm not a programmer by any stretch of the imagination but I have wondered why programmers don't incorporate virus protection as an embed to the programs they write.  (NOTE: Maybe they do but I'm not aware of it.)  We depend upon external programs; i.e. Norton, AVG, Symantec, McAfee, etc. to provide protection but these are not always effective and must be upgraded frequently, sometimes weekly.  Also, are there any programs that will interrogate the IP address of the hacker or sender?  Again, very informative.


User Rank
Essence of the problem
GeorgeG   6/14/2013 9:38:42 AM
I'm surprised there hasn't been more traffic on this post. Perhaps that's an indication of the problem. As the post suggests, security must be structure, not veneer. The notion of a security patch is akin to the notion that you can fix a leak in the basement with a bit of caulking.

As the old saying goes 'it's all fun until someone loses an eye'. Even when a control system performs as intended, there's some chance of safety failures. However, a system cannot be considered safe unless it is rendered immune to external influences yet most integrators and users feel comfortable with a poorly thought out Maginot line of defence. In general, integrators and, worse, control system component suppliers (hardware and software) prefer to be agnostic to security issues expecting someone else to somehow provide an adequate defence - this has got to change. Many are the times I've sat through a presentation for an object/tag oriented controls package where the entire emphasis is on how easy it is to 'see' data and how easy it is to implement changes; so often, object manipulation is devoid of any semblance of change management or even basic validation of parameters: can you configure an unstable condition on a servo axis (what's stopping you)? Can you do it while the equipment is running? How much basic authentication is required?          

<<  <  Page 2/2

Partner Zone
Latest Analysis
A panel on cybersecurity at ARM TechCon called for regulations to protect the security of connected devices.
Do you wear your ugly Christmas sweater while fighting zombies, or simply chill in front of your homemade entertainment center while your automated cat feeder keeps your feline friend at bay? Whatever you prefer, one of the following gadgets is sure to get your DIY motor running.
The design of products has been altered altogether through 3D printing. Parts that couldn’t be produced at all before 3D printing came along are often superior to conventionally produced parts.
Marine mussels and their interaction with the ocean environment has inspired a breakthrough in developing a nontoxic coating for organic electronic components that also could speed up the manufacturing process.
The Innovation Challenge Awards had one run-away winner at ARM TechCon 2016. Of the six awards presented, one company walked away with four.
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 10 - 14, Embedded System Design Techniques™: Getting Started Developing Professional Embedded Software
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7 | 8 | 9 | 10

Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Course November 8 - 10:
Sponsored by 3M
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Technology Marketplace

Copyright © 2016 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service