Automation Security & Scalability: Smart Solutions For Maintenance & Reliability
Automation Security & Scalability: Smart Solutions For Maintenance & Reliability
com
AUTOMATION SECURITY
& SCALABILITY
NEXT PAGE
AUTOMATION
WWW.PLANTSERVICES.COM
A MORE-COMPREHENSIVE APPROACH
PREVIOUS PAGE
NEXT PAGE
AUTOMATION
WWW.PLANTSERVICES.COM
Industrial manufacturing leaders that partner with effective cybersecurity services providers allow their internal
resources to concentrate on their core business. They also
provide protection for their companys assets, people, and
customers.
AN ONGOING PROCESS
REFERENCE
Ongoing services for managing and maintaining your security against current and potential cyber threats is a critical element. Using the capabilities provided through a cybersecurity operations center (CSOC) such as the Siemens
CSOC can provide 24/7 monitoring as well as operations
and updates of deployed security controls based on realtime intelligence. Proactive monitoring and continuous
security management reduces the risk of production loss
and equipment damage caused by cybersecurity threats,
and it protects intellectual property, company reputation,
and brand image.
In addition, on-demand remote-incident handling should
be implemented, ideally with ICS cybersecurity experts
available to respond quickly to provide support in executing
forensic investigations, containing possible damages to the
operating environment, and eradicating further risks.
1. N
ational Cybersecurity and Communications Integration
Center (NCCIC), 2015. ICS-CERT Monitor, September
2014-February 2015. https://ics-cert.us-cert.gov/sites/
default/files/Monitors/ICS-CERT_Monitor_Sep2014Feb2015.pdf
PREVIOUS PAGE
NEXT PAGE
AUTOMATION
WWW.PLANTSERVICES.COM
coffee maker with your smartphone upstairs and get a notification when your cup of coffee is done brewing downstairs. You
can also turn up your thermostat with the touch of your phone
to increase the temperature before you get out of bed. This
technology is part of the Internet of Things, and it is helping to
make peoples everyday lives more convenient and efficient.
The Internet of Things revolves around increased machine-to-machine (M2M) communication and is built on
cloud computing and networks of data-gathering sensors.
Beyond its application in our home lives, this concept is
becoming widely used in the industrial sector and has been
dubbed the Industrial Internet of Things (IIoT). Now M2M
technology allows us to manage and monitor equipment
remotely and address problems in a timely manner, which
translates to cost savings. The average field service visit now
costs more than $1,000, according to data from the Technology Services Industry Association, and every eliminated
field visit adds to an organizations bottom line.
A variety of M2M solutions can help diagnose and fix equipment issues. Among these are the remote desktop, which allows
users to manage the machine/process remotely as though
they were standing in front of a human-machine interface
(HMI) connected to a supervisory control and data acquisition (SCADA) system. (HMI/SCADA solutions have become
a widely used tool in a variety of industries and are often at the
heart of an operations data visualization, control, and reporting process to drive operational improvements.) A development
software interface enables users to connect remotely to HMI/
SCADA systems to make machine/process changes over the
Internet without forcing unnecessary shutdowns.
While remote monitoring solutions such as HMI can
provide cost savings and increased efficiency, its important to
understand the security risks associated with this technology
and how to protect against them. Past cybersecurity breaches
have shown how harmful cyberattacks can be for remoteactivity operations in the industrial sector. For example, the
Stuxnet virus is a computer worm that targeted industrial
control systems used to monitor and control large-scale
industrial facilities such as power plants, dams, and waste
processing systems. The virus lets the attackers take control
of these systems without the operators knowing as much, and
the hackers can manipulate real-world equipment. Because
of Stuxnet-type viruses and other various cyber threats, there
PREVIOUS PAGE
NEXT PAGE
AUTOMATION
WWW.PLANTSERVICES.COM
PREVIOUS PAGE
NEXT PAGE
AUTOMATION
WWW.PLANTSERVICES.COM
PREVIOUS PAGE