This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Machinery cybersecurity: Optimising resilience

03 May 2022

As cyber-physical systems are deployed, new vulnerabilities may emerge and a cyberattack can put an entire industrial facility at risk. Vulnerabilities include a lack of knowledge about how to apply IT security protection to machinery that has not traditionally required it, as well as systems running legacy communication networks with which today’s cybersecurity software is incompatible.

Furthermore, merging traditional ways of working with Industry 4.0 approaches can cause problems. For example, remote maintenance by equipment suppliers or subcontractors requires a connection to their network, which may be infected or have less stringent IT security. Likewise, any existing machines on the factory floor that lack digital identification and authentication functionality do not allow end users to be sure that operating instructions received by the network are from an authorised person and not a hacker. There is also the risk that the smart tags on components or the final product may be manipulated in a cyberattack. 

Machinery suppliers and integrators must therefore optimise the cyber resilience of their connected components and systems, implementing security solutions from the start. For machinery end users, this means that analyses, assessments and tests should be pivotal in implementing appropriate security controls.

Read the full article in the May issue of DPA

Contact Details and Archive...

Print this page | E-mail this page