BYOD Security in Perspective

Permitting any kind of outside network access to plant floor control systems has long been a major obstacle for many engineering teams. And it remains an obstacle for many engineers who cite clear security and operations concerns. However, most industrial companies today have accepted the fact that networked control systems are a fact of modern manufacturing and have increased their corporate and manufacturing IT security practices and policies in response.

Following close on the heels of industry\’s broad acceptance of networked control systems came the BYOD (bring your own device) movement – wherein corporate issued or personally owned mobile devices such as smart phones and tablet computers were being used to access automation and control networks. Accepting and securing in-house plant floor systems was one thing; extending that concept to employees\‘ mobile devices was a bridge too far for many engineers and plant managers. Though the concept is still in its early days, the momentum around BYOD is much like that behind the push for networked systems a decade or more ago. The difference now is that, since industry has largely accepted the networked control system concept, acceptance of BYOD is likely to occur at a much more rapid pace. Like the initial concerns around networked control systems, the main concern with BYOD is how to secure all those devices. Eric Byres, chief technology officer and vice president of engineering for Tofino Security at Belden Inc., made note in his blog recently about comments presented on the BYOD security topic at the International NCSC One Conference 2014 at the World Forum in The Hague. He noted that \“while security traditionalists talk about ensuring confidentiality, availability, and integrity … the real goals can be divided into two more general ones: maintaining safety and maintaining control.\“ Considering the inevitable increase in mobile device use in industry, this more targeted approach seems to make sense. As Marc Leroux, marketing manager, CPM Technologies R&D at ABB says, plant managers today \“need to have instantaneous access to all pertinent plant information, whenever he wants, wherever he is. With the larger amounts of data now available, and the always connected environment we are accustomed to, that information has to be available on phones, tablets and desktops.\“ Given this reality, Byres questions if iPhone or Android smart phones are really the security risk the IT world claims. To put the issue in perspective, Byres asks: \“How many truly effective rootkits have you seen for attacking iPhones? Now consider how many rootkits there are for taking over PCs.\“ He also notes that IT groups rarely encounter the need to patch many serious mobile device vulnerabilities, yet they have to install critical Windows, Java, or Adobe patches on PCs every week. Byres goes so far as to point out that personal phones may actually be more secure than all the other devices welcomed by traditional IT. \“Smart phones are more carefully guarded by their owners,\“ he says. Backing up this assumption, Byres referenced studies that show, on average, people notice and report a missing phone in less than 20 minutes compared to 24 hours for a missing wallet. \“If someone stole my laptop on a weekend, it could be two days before I noticed,\“ Byres says. \“And once an iPhone goes missing, the remote wipe features are very effective. I doubt my IT department could ever wipe the laptop they gave me if I happen to lose it.\“ The mobile future of manufacturing is already here. How industry adapts to that reality will determine how quickly and how widespread the benefits will be for the early adopters.

Manufacturing Connection
http://www.automationworld.com

Das könnte Sie auch Interessieren

Weitere Beiträge

Bild: Ceratizit Deutschland GmbH
Bild: Ceratizit Deutschland GmbH
Werkzeuge – immer passend

Werkzeuge – immer passend

Eine digitalisierte Fertigung hat viele Gesichter… und Recker Technik aus Eschweiler setzt ihr auf jeden Fall einen Smiley auf. Dort bringt die Produktion mit digitalen Zwillingen mehr Effizienz in den Alltag sowie gleichzeitig mehr Überblick über das Toolmanagement und die Werkzeugkosten. Mit dabei: Zwei Tool-O-Maten, die intelligenten Werkzeugausgabesysteme von Ceratizit – dank denen immer das passende Werkzeug für den Job zur Hand ist.

mehr lesen
Bild: Hainbuch GmbH
Bild: Hainbuch GmbH
„Wie passende Spanntechnik die Automation voranbringt“

„Wie passende Spanntechnik die Automation voranbringt“

Zunehmend individuellere Kundenanforderungen, mehr Schwankungen im Auftragseingang und weniger Fachkräfte – diese Faktoren beeinflussen die Fertigungsplanung zunehmend. Gerade bei kleinen Herstellungschargen mit Losgrößen unter 100 macht in diesem Spannungsfeld die Automatisierung, etwa von Hainbuch, den Unterschied. Ein entscheidender Ansatzpunkt in der Umsetzung ist neben Maschine, Roboter und Bediener der Rüst- und Spannprozess.

mehr lesen
Bild: Schunk SE & Co. KG Spanntechnik
Bild: Schunk SE & Co. KG Spanntechnik
Futter für die Ewigkeit

Futter für die Ewigkeit

Siemens Energy setzt für die Präzisionsbearbeitung an einer Horizontaldrehmaschine Magnos Elektropermanent-Magnetspannfutter von Schunk ein. Dank der gleichmäßig dauerhaft wirkenden Magnetspannkraft erfolgt das Spannen der Werkstücke deformations- und vibrationsarm – für eine ausgezeichnete Bearbeitungs- und Oberflächenqualität. Mit der zugehörigen App lässt sich die Spannsituation simulieren und sicher parametrieren.

mehr lesen