The use of in-depth defence mechanisms and network architectures that limit the potential for damage as a result of malicious attacks is just one of the things we do in ATS Applied Tech Systems. Read further why you should pay attention to Industrial Cyber-security.The recent IEEE article on the Ukraine power outage is worth reading for engineers involved in industrial IT infrastructure issues. Our colleagues in the ICT world rely heavily on perimeter intrusion prevention and end-point security mechanisms through a combination of firewalls, port-blocking, two factor authentication at the perimeter of the corporate network and anti-virus, anti-malware etc at the PC’s. But often, insufficient, if any, attention is paid to what happens in the middle and ICT departments avert their attention from fairly obvious shortcomings in a policy based approach to security.

It’s not uncommon to find a site where a maintenance or project department has added a low cost wireless router to support a project team, or connect to a temporary premises. At that point, frankly, all bets are off!

Eric Byres has been focussing on this issue for many years and his work highlights the need for industrial systems to detect attacks by using deep inspection of industrial protocols. After all, PLC’s don’t run anti-virus and many, including some of the best known, can be easily overwritten in such a way that critical operating parameters are subtly modified to create minor but damaging changes, or more obviously, to be completely shut-down or faulted so as to cause immediate disruption.

If we can help you meet your cyber-security challenge – give us a call at 1300 468 288!

Go to the IEEE article on the Ukraine power outage

Armin Fahnle, ATS
by Armin Fahnle
Managing Director, ATS Applied Tech Systems Pty Ltd

You can comment or meet me on LinkedIn or ATS Google+