小程序
传感搜
传感圈

We Need to Make Smart Manufacturing Safer With Better Cybersecurity

2023-01-17
关注

We Need to Make Smart Manufacturing Safer With Cybersecurity
Illustration: © IoT For All

Manufacturing cybersecurity cannot be an afterthought. These days, it seems easier to count the companies that haven’t been affected by cybercrime than the ones that have. A stunning 80 percent of firms that responded to Duke University’s 77th Global Business Outlook Survey said their networks had been breached for some nefarious end or another.

Whether to steal, tamper with, or ransom sensitive enterprise data, it’s all too easy for hackers to find and exploit unpatched security gaps in modern technology. When that happens to a small business like a contract manufacturer, in 10 percent of cases, that business isn’t able to recover and doesn’t open its doors again. Here’s what smart factory owners need to know about manufacturing cybersecurity.

'A stunning 80 percent of firms that responded to Duke University's 77th Global Business Outlook Survey said their networks had been breached for some nefarious end or another.' -Emily NewtonClick To Tweet

Where Do Manufacturing Threats Come From?

Smart manufacturing is defined by several technologies, all of which depend upon internet access to exchange data. Smart factories consist of tech that enables:

  • Predictive machine maintenance
  • Remote monitoring of processes
  • End-to-end process visibility
  • Automated quality control
  • Smart warehousing and organization
  • Predictive capabilities for demand and output
  • Remote resource management

This means there isn’t just one possible point of entry or failure bad actors can take advantage of in smart manufacturing. In fact, there’s a wide range of possible intrusion points, including back-office computers and traditional IT, data warehouses, operational technology (OT) like the Internet of Things (IoT), customized software, and legacy systems.

Actions Manufacturers Can Take

Culture needs to be a top priority as you assess the current threat landscape and take measures to protect your organization. Some of the following points are closely related to building a conscientious, safety-minded culture. This is done by educating the workforce on the current threat landscape regularly and instituting organized cybersecurity training.

Other manufacturing cybersecurity actions require some technological know-how, such as bifurcating industrial networks for data partitioning and achieving the best level of protection. Here are some steps worth taking to protect your smart factory.

Conduct a Risk Assessment Annually

Your business and its technology stack change regularly — so do cybersecurity threats. An annual cybersecurity risk analysis will reveal where to invest your efforts and where you might be able to eliminate wasted time or resources. The National Institute of Standards and Technology (NIST) has a series of free resources available so business owners and stakeholders can understand fundamental cybersecurity risks and how to take effective precautions.

Train New Employees and Retrain Veterans

It’s critical to prioritize cybersecurity awareness and preparedness in new employee onboarding. This must also be a recurring training topic for seasoned team members.

Why does manufacturing cybersecurity demand ongoing learning? Because protecting manufacturing assets requires vigilance. Workers must know what phishing attempts look like so they don’t hand over sensitive credentials in an email. Routine training and testing help ensure your team stays on its guard.

Ongoing learning is essential because the nature of the threat changes regularly. When hackers identify a vulnerable endpoint in a targeted network, they’re often able to exploit it in 15 minutes or less. Every workforce needs to know about the latest vulnerabilities and what actions to take to keep assets safe.

Create Separate Networks for Smart Technology

One of the most common and helpful pieces of advice you’ll receive about hardening a smart factory against outside interference is setting up separate networks for smart technology. In fact, this course of action is recommended by the FBI. If a criminal compromises one of your networks, it means they won’t be able to capture data from industrial IoT devices.

Back-office computers with client and payroll data shouldn’t run on the same network as industrial control devices. Hackers could desire payroll data as well as proprietary information from machine-tending software.

Understand How Service Providers Protect Themselves

Global commerce is in the grips of a technological arms race. IoT, inventory-tracking platforms, connected manufacturing equipment, and other tech breakthroughs bring performance and competitive enhancements. They also present risks stakeholders in smart factories need to understand.

APIs — application programming interfaces — are a primary tool with which manufacturers and other entities incorporate third-party telematics, tracking, and sensing hardware with their existing tech stacks. Unfortunately, APIs are so vulnerable to an attack that we’ve stopped counting which ones have been breached and now count which ones have not. In a report published in 2021, only 6 percent of surveyed companies reported no API-related cybersecurity problems in the previous year.

This is just one way in which a smart factory might become compromised. Still, manufacturers must understand how their third-party technology and digital service providers protect themselves and their infrastructure. Again, NIST provides resources — this time in the form of assessment and auditing considerations as you look at potential outside technology partners.

Implement Zero-Trust Architecture

Ultimately, the best thing manufacturers can do to maintain cybersecurity in smart factories is commit to zero-trust architecture. Zero-trust architecture combines several features:

  • Strong user-identity authentication
  • Least-privilege policies throughout the organization
  • Verifications for user-device integrity

The main benefit of zero-trust architecture is it assumes no single device or network access point is secure. It also awards access credentials only to parties requiring that level of access to complete their current objective.

Setting up zero-trust in the workplace is an important step to take not just because of the result, but also because it forces stakeholders to identify vulnerable processes and endpoints in the organization’s infrastructure. This will help prioritize which actions to take, determine which vendors may be susceptible, and inform which cybersecurity products to purchase.

Smart Manufacturing Cybersecurity Can’t Be an Afterthought

Smart manufacturing has been a major technological boon when it comes to meeting rising global demands. Manufacturers have more tools than ever for gathering and analyzing process data and making factories more efficient, but these tools also bring vulnerabilities. Understanding the risk types and how to protect one’s organization can’t be an afterthought — manufacturing cybersecurity needs to be a top priority every step of the way.

Tweet

Share

Share

Email

  • Cybersecurity
  • Automation
  • Industrial Automation
  • Industry 4.0
  • Manufacturing

  • Cybersecurity
  • Automation
  • Industrial Automation
  • Industry 4.0
  • Manufacturing

参考译文
我们需要用更好的网络安全让智能制造更安全
制造业网络安全不能是事后才考虑的。如今,统计没有受到网络犯罪影响的公司似乎比统计受到网络犯罪影响的公司更容易。在杜克大学第77次全球商业展望调查中,有80%的公司表示,他们的网络曾因某种邪恶目的而遭到攻击。无论是窃取、篡改或勒索敏感的企业数据,黑客都很容易发现并利用现代技术中未修补的安全漏洞。当这种情况发生在像合同制造商这样的小企业身上时,在10%的情况下,该企业无法恢复,无法再次开门营业。以下是智能工厂所有者需要了解的关于制造业网络安全的知识。智能制造由多种技术定义,所有这些技术都依赖于互联网访问来交换数据。智能工厂由技术组成:这意味着在智能制造中,不良行为者可以利用的入口或失败点不只有一个。事实上,可能的入侵点范围很广,包括后台计算机和传统IT、数据仓库、物联网(IoT)等运营技术(OT)、定制软件和遗留系统。当您评估当前的威胁状况并采取措施保护您的组织时,文化需要成为最优先考虑的事项。以下几点与建设有良心、有安全意识的文化密切相关。为此,定期对员工进行有关当前威胁形势的教育,并开展有组织的网络安全培训。其他制造业网络安全行动需要一些技术知识,例如分岔工业网络以进行数据分区,并实现最佳级别的保护。这里有一些值得采取的措施来保护你的智能工厂。您的业务及其技术堆栈经常变化,网络安全威胁也是如此。年度网络安全风险分析将揭示在哪些方面投入精力,以及在哪些方面可以消除浪费的时间或资源。美国国家标准与技术研究院(NIST)提供了一系列免费资源,以便企业所有者和利益相关者了解基本的网络安全风险,以及如何采取有效的预防措施。在新员工入职时优先考虑网络安全意识和准备工作是至关重要的。对于经验丰富的团队成员来说,这也必须是一个反复出现的培训主题。为什么制造业的网络安全需要持续学习?因为保护制造业资产需要警惕。工作人员必须知道网络钓鱼企图是什么样的,这样他们就不会在电子邮件中提交敏感的凭证。例行的培训和测试有助于确保您的团队保持警惕。持续的学习是必不可少的,因为威胁的性质经常变化。当黑客在目标网络中识别出一个易受攻击的端点时,他们通常能够在15分钟或更短的时间内利用它。每个员工都需要了解最新的漏洞,以及采取什么行动来保证资产安全。关于加强智能工厂抵御外部干扰,你会收到的最常见也是最有用的建议之一是为智能技术建立单独的网络。事实上,这是FBI推荐的做法。如果犯罪分子破坏了你的网络,这意味着他们将无法从工业物联网设备中获取数据。带有客户和工资单数据的后台计算机不应该与工业控制设备运行在同一个网络上。黑客可以从机器管理软件中获取工资单数据和专有信息。全球商业正处于一场技术军备竞赛之中。物联网、库存跟踪平台、互联制造设备和其他技术突破带来了性能和竞争力的增强。智能工厂的利益相关者也需要了解这些风险。 api——应用程序编程接口——是制造商和其他实体将第三方远程信息处理、跟踪和传感硬件与现有技术堆栈结合的主要工具。不幸的是,api很容易受到攻击,我们已经停止计算哪些已经被破坏,现在开始计算哪些没有被破坏。在2021年发布的一份报告中,只有6%的受访公司在前一年没有报告任何与api相关的网络安全问题。这只是智能工厂可能受到损害的一种方式。尽管如此,制造商必须了解他们的第三方技术和数字服务提供商如何保护他们自己和他们的基础设施。NIST再次提供了资源——这一次是评估和审计考虑的形式,因为您正在寻找潜在的外部技术合作伙伴。最终,制造商为维护智能工厂的网络安全所能做的最好的事情就是致力于零信任架构。零信任体系结构结合了几个特性:零信任体系结构的主要好处是它假定没有单个设备或网络接入点是安全的。它还仅向需要该级别访问以完成其当前目标的各方授予访问凭据。在工作场所建立零信任是一个重要的步骤,这不仅是因为结果,还因为它迫使涉众在组织的基础设施中识别易受攻击的过程和端点。这将有助于优先考虑采取哪些行动,确定哪些供应商可能易受影响,并告知购买哪些网络安全产品。在满足日益增长的全球需求方面,智能制造一直是一项重大的技术福利。制造商拥有比以往任何时候都多的工具来收集和分析工艺数据,提高工厂的效率,但这些工具也带来了漏洞。了解风险类型以及如何保护组织不能是事后才考虑的事情——制造业的网络安全需要成为每一步的首要任务。
  • smart
您觉得本篇内容如何
评分

相关产品

Smart Fog Smart Fog® S3 温湿度变送器

Smart Fog® S3相对湿度传感器的设计能够承受各种因素的影响。可拆卸的烧结过滤器保护聚合物电容传感器不受可能与变送器接触的固体物体的影响。

Hitachi High-Tech Analytical Science PMI-Master Smart 元素分析仪

"The PMI-MASTER Smart is the first truly portable optical emission spectrometer for metal analysis.Thanks to its light weight and small size, the PMI-MASTER Smart can be conveniently carried, making theThe PMI-MASTER Smart can also be operated using the external power supply\/charger, with or without batteryWhat makes the PMI-MASTER Smart different to other mobile analyzers?

深圳云里物里 MTC02 Smart Finder 2 Find My 产品

云里物里自主研发推出的全新二代Find My网络寻物定位产品MTC02 Smart Finder 2,支持Bluetooth®5.0,最远广播距离可达120m。

Airmar Technology B122 Long Stem, Smart Sensor 超声波换能器

说明,长杆,B122传感器是设计用于厚壳木船或有陡峭的死升船舶。包括高性能整流罩垂直定向声束强回波,导致最佳性能。外壳内的智能数字信号处理可将深度和温度数据发送至图表绘图仪、雷达屏幕或数字显示器,无需使用专用深度测深仪。并且可以伸缩,插入件可以拆下以便维修和存储。制造商零件号 Furuno NMEA 2000®—235 MSLF——Airmar—44-151-1-02 Furuno NMEA 0183—235DHT LMSE‑4—Airmar—44-082-1-01,特征

STEGO CSS 014 Smart Sensor 湿度计和湿度测量仪器

紧凑型智能传感器css014以电子方式记录温度和湿度,并将测量数据转换为标准的4至20毫安模拟信号。转换后的值信号可由控制或监控单元(例如,PLC控制)使用或进一步处理。智能传感器适用于多种应用,甚至可以在风力发电等恶劣环境条件下使用。

Anton Paar 安东帕 Carbo 510 Smart Sensor 溶解二氧化碳检测仪

Carbo在线二氧化碳分析仪用于在线二氧化碳测量。它是用变压法兰直接安装的。它将产品特定的数据(目标浓度、报警限值等)存储在MPDS2000v3评估单元中。它是啤酒厂在灌装前和过滤后在线测量二氧化碳的理想选择。

评论

您需要登录才可以回复|注册

提交评论

提取码
复制提取码
点击跳转至百度网盘