Breaking News
Blog

How Vulnerable Is Industrial Control? You Might Be Surprised

NO RATINGS
1 saves
View Comments: Threaded | Newest First | Oldest First
Charles.Desassure
User Rank
Manager
Joe Weiss is 100% correct.
Charles.Desassure   7/4/2013 1:48:11 AM
NO RATINGS
Joe Weiss is 100% correct.   Many companies talk about security, but their management team has no idea what is going on or what is required for information security processes to be successful for their product.  I worked in the area of information security for many years before moving into higher education where I teach courses in this area. We still have a long way to go before companies understand that security should always be at the top of the list. 

CMathas
User Rank
Manager
Re: Joe Weiss is 100% correct.
CMathas   7/10/2013 10:46:33 AM
NO RATINGS
So if we have a long way to go--what steps can be taken to get there?


This seems pretty critical.

LarryM99
User Rank
CEO
Re: Joe Weiss is 100% correct.
LarryM99   7/11/2013 12:16:47 AM
NO RATINGS
The current security paradigms are moving away from most of the defenses being at the gateway to the system, because it leads to targets that are described as "crunchy on the outside but soft on the inside". Based on that many would advise making these controllers more resistant to attack. Unfortunately, they are relatively unsophisticated devices. What needs to happen is the creation of an effective strategy to protect their programming. For example, you could set up a disconnected computer to program them (the "air gap" that was described in the article) and set up strict scanning protocols for both that machine and media used to transfer files to it.

This works as long as the controllers can be effective on disconnected systems. Unfortunately from a security point of view, they are most efficient when feeding their data to a network. This requires very strong network configuration and monitoring, but if it can be separated from the programming interface that might be effective.

August Cartoon Caption Winner!
August Cartoon Caption Winner!
"All the King's horses and all the KIng's men gave up on Humpty, so they handed the problem off to Engineering."
5 comments
Top Comments of the Week
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Flash Poll
Radio
LATEST ARCHIVED BROADCAST
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.