Just because someone defeated a system once, at manufacture is no reason to think it neccesarily will happen again. many things are done a First Time and then people learn. Remember the passengers brought down flight 88 before it could reach its target once they realized what was happening.
It is just logical that a closed loop wired system will be more secure. I wrote a ton of papers on my old DOS machine that stood alone, created designs delivered by print and/or disk and kept track of all of my billing and bank accounts. My only fear was some clown who would want to shove some disk in to share a "Really Neat Program". Touch it and you die.
All of this automated, wireless, paperless and anything else less, reminds me of lines from an old Creedence Clearwater Rivival song.
"Rushing through the treadmill,
Rushing to get home,
Worry 'bout the time you save".
I would not alllow a smartphone on the shop floor and maybe not even in the company. As for music, I do not think tuning in a local FM station will cause any system crashes.
Well-written and comprehensive article about many aspects to this growing concern as more and more smartphones are making their way into the realm of connected networks. This will become even more pressing as the Internet of things becomes a reality.
Rob, what I understood is most of the smartphones are becoming at par with laptop and desktop in terms of computing power. So I think it's possible to control the entire function through smartphones, but how? That answer yet to be find.
Rob, of course it is almost always easier to go wireless, just as it is easier to leave your keys in the door lock, and easier to not lock the car at all. But many times the way to achieve the results that one wants require more than an absolute minimum effort. And those who refuse to deliver more than a minimum effort don't get any sympathy from me.
All of my customers are quite happy with my charges because they know that I never do a job using only the minimum possible effort. Almost always it is possible to deliver a much better value for "a bit" more effort. While delivering only the minimum to achieve the goal, only just barely, represents the best very short term return on investment, it seldom delivers the greatest long term value.
My point being that using a wired connection instead of a wireless connection does in fact deliver more security.
I now realize that STUXNET was not the best example of a serious virus passed through the internet, but that it is defintely an example of how sophisticated hacking can be.
William Your example.. (Stuxnet) illustrates just how pointless the networking security question is.
And how pointless physical security is.
The stuxnet infected machines were not on a network with any connection to the outside world. The machines were infected during the burning of the boot ROMs (installed during the manufacturing of the computer's motherboard) Nothing else was required. No wireless networks. No network connections to the internet. No network connections to other parts of the facility. No getting past physical barriers required. The people building the computers didn't know of stuxnet. The people installing the computers didn't know. The people monitoring the computers didn't know.
The Stuxnet virus looked for a local network connection with specific hardware (xx number of centrifuges of a specific make)... before doing anything (randomly screwing with their speeds).
Do you think any normally implemented hardware or software security system could have detected it? The answer is no.
It took an exceptional individual spending hundreds of hours in a completely different part of the world ..working a completely different problem to discover it.
The solution to security isn't going to come from "the usual suspects".
The way to keep machines on a line secure even while smart phones are all around is to not have any wireless anything connected to those machines. Wired connections to a separate network that does not have internet access at any point, nor wireless access anywhere. Protection schemes that use only software are way less than completely secure, no matter who makes what assertions some may make. Remember "STUXNET" and how well it passed right through all kinds of security walls and fences. Just because one team sees no way to hack into a machine is no reason to believe somebody else can't do it.
Bobjengr, I would certainly guess the banning of cell phones is related to security rather than productivity. Cell phones are certainly welcomed in every other job setting. You have a good question about nuclear plants. Yikes.
Robots that walk have come a long way from simple barebones walking machines or pairs of legs without an upper body and head. Much of the research these days focuses on making more humanoid robots. But they are not all created equal.
The IEEE Computer Society has named the top 10 trends for 2014. You can expect the convergence of cloud computing and mobile devices, advances in health care data and devices, as well as privacy issues in social media to make the headlines. And 3D printing came out of nowhere to make a big splash.
For industrial control applications, or even a simple assembly line, that machine can go almost 24/7 without a break. But what happens when the task is a little more complex? That’s where the “smart” machine would come in. The smart machine is one that has some simple (or complex in some cases) processing capability to be able to adapt to changing conditions. Such machines are suited for a host of applications, including automotive, aerospace, defense, medical, computers and electronics, telecommunications, consumer goods, and so on. This discussion will examine what’s possible with smart machines, and what tradeoffs need to be made to implement such a solution.