{"id":9889,"date":"2018-11-26T15:04:29","date_gmt":"2018-11-26T15:04:29","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=9889"},"modified":"2018-11-26T15:04:29","modified_gmt":"2018-11-26T15:04:29","slug":"cybersecurity-in-the-emerging-digital-world","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/","title":{"rendered":"Cybersecurity in the emerging digital world"},"content":{"rendered":"<p><strong>It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans. <\/strong><\/p>\n<p>However, as we move along the road towards Smart Manufacturing with a view to improving efficiency, productivity and reliability of supply using the principles of Industry 4.0 and the Industrial Internet of Things (IIoT), the subject of cyber-security is becoming arguably even more important.<\/p>\n<p>Smart Manufacturing relies on a greater convergence of the IT and OT layers of a business and if that is applied to an existing plant, it would be reasonable to assume that the potential for cyber-attack, if not understood and mitigated against would be higher.<\/p>\n<p>If we were designing a new plant on a greenfield site, it would be relatively easy to build it while being mindful of all the current cybersecurity issues and vulnerabilities.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-7565662001938327\" data-ad-slot=\"7585079586\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><br \/>\nThe reality is that most manufacturing plants in the UK have been around a long time and most of the automation considerations are centred around productivity not cybersecurity.<\/p>\n<p>In this existing industrial landscape, it was realised that control systems were potentially vulnerable, often due to out of date or poorly maintained operating systems and CD drives or USB ports that had not been locked down.<\/p>\n<p>Cybersecurity is an arms race of escalating capabilities, so \u2018defenders\u2019 of vulnerable assets must see it as a journey rather than a destination, constantly reassessing the situation and implementing new defences whenever necessary. This is against the background of developing technologies and requirements that mean control systems are always becoming bigger, more complex, more distributed and increasingly open.<\/p>\n<p>To be successful the defence strategy against cyber-attack must be seen in a holistic way and needs to happen at all levels of the enterprise. This must start at the plant level and automation equipment manufacturers must look to build in security as a natural part of the design process.<\/p>\n<p>For instance, PLCs (programmable logic controllers) need to include multiple embedded features such as hardware security keys and multi-layer password structures.<\/p>\n<p>Use of hardware security key authentication prevents programs from being opened or edited on unapproved personal computers that have not been \u2018bound\u2019 to the security key.<\/p>\n<figure id=\"attachment_9891\" aria-describedby=\"caption-attachment-9891\" style=\"width: 230px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-12.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-9891\" src=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-12-230x300.jpeg\" alt=\"\" width=\"230\" height=\"300\" srcset=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-12-230x300.jpeg 230w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-12-768x1000.jpeg 768w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-12-786x1024.jpeg 786w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-12-800x1042.jpeg 800w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/a><figcaption id=\"caption-attachment-9891\" class=\"wp-caption-text\">Chris Evans, Marketing &amp; Operations Group Manager at Mitsubishi Electric. Source: Mitsubishi Electric Europe BV<\/figcaption><\/figure>\n<p>PLC CPUs can also be paired to the security key and programs will not run unless this hardware match exists. This also has the benefit of protecting the intellectual property of the control system.<\/p>\n<p>Additionally, IP filtering should be used to register the IP addresses of devices approved to access each PLC or HMI (Human Machine Interface). This makes unauthorised access much more difficult.<\/p>\n<p>Whilst end users will want maximum security; they will also continue to insist on simplicity of operation.<\/p>\n<p>Some of these automation security measures, all of which are optional, could be argued to complicate operations and that is why a holistic view of security needs to be taken, considering all aspects of the operation. It may be that in some areas, some measures can be relaxed for the sake of continued operations and this is fine provided that the risk has been assessed and counter measures are implemented elsewhere to alleviate the threat.<\/p>\n<p>As with everything related to cyber-security the consideration has to be probability and risk, security and operational systems should be designed around these important criteria.<\/p>\n<p>It is probably an unchangeable aspect of the human condition that some people will always seek unauthorised access to control systems. Therefore, manufacturers and control engineers must build security measures into their products and systems and recognise that these are surmountable hurdles rather than impregnable barriers, so must be constantly renewed and redeveloped.<\/p>\n<p>Chris Evans is Marketing &amp; Operations Group Manager at <span class=\"highlight highlight-blue\"><a href=\"http:\/\/gb3a.mitsubishielectric.com\" target=\"_blank\" rel=\"noopener\">Mitsubishi Electric<\/a><\/span>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans. However, as we move along the road towards Smart Manufacturing with a view to improving efficiency, productivity and reliability of supply using the principles of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":9890,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[5305,347,349],"class_list":["post-9889","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-news-views-and-opinion","tag-cybersecurity","tag-digitalisation","tag-mitsubishi-electric-europe"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in the emerging digital world - Engineer News Network<\/title>\n<meta name=\"description\" content=\"It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in the emerging digital world - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-26T15:04:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-11.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Cybersecurity in the emerging digital world\",\"datePublished\":\"2018-11-26T15:04:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/\"},\"wordCount\":645,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/download-11.jpeg\",\"keywords\":[\"cybersecurity\",\"digitalisation\",\"Mitsubishi Electric Europe\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/\",\"name\":\"Cybersecurity in the emerging digital world - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/download-11.jpeg\",\"datePublished\":\"2018-11-26T15:04:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/download-11.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/download-11.jpeg\",\"width\":2100,\"height\":1500,\"caption\":\"As we move along the road towards Smart Manufacturing the subject of cyber-security is becoming arguably even more important. Source: Mitsubishi Electric Europe BV\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/cybersecurity-in-the-emerging-digital-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in the emerging digital world\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in the emerging digital world - Engineer News Network","description":"It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity in the emerging digital world - Engineer News Network","og_description":"It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/","og_site_name":"Engineer News Network","article_published_time":"2018-11-26T15:04:29+00:00","og_image":[{"width":2100,"height":1500,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-11.jpeg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Cybersecurity in the emerging digital world","datePublished":"2018-11-26T15:04:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/"},"wordCount":645,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-11.jpeg","keywords":["cybersecurity","digitalisation","Mitsubishi Electric Europe"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/","name":"Cybersecurity in the emerging digital world - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-11.jpeg","datePublished":"2018-11-26T15:04:29+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"It seems a long time ago now since various malware attacks on the operational layer changed the security landscape and highlighted vulnerabilities in the de-facto automation architecture, writes Chris Evans","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-11.jpeg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/11\/download-11.jpeg","width":2100,"height":1500,"caption":"As we move along the road towards Smart Manufacturing the subject of cyber-security is becoming arguably even more important. Source: Mitsubishi Electric Europe BV"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/cybersecurity-in-the-emerging-digital-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in the emerging digital world"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=9889"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9889\/revisions"}],"predecessor-version":[{"id":9892,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9889\/revisions\/9892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/9890"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=9889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=9889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=9889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}