Progea is now part of Emerson.

Scada HMI

Cyber Security in the industrial systems

18 September 2020

Nessuna risposta

With the arrival of Industry 4.0 and the consequent increase in connections between different devices in the field and from remote systems, the need to protect data has consequently become a fundamental need for every company. Therefore, research within cyber security has always its eyes open to potential risks. The new means of attack used by hackers aim to access industrial IoT environments.

The IoT security of these very important infrastructures is a top priority.

So, what is Cyber Security?

Cyber Security is the set of technological, organized, and procedural measures necessary for the protection of computer systems, with the aim of ensuring the confidentiality, integrity and availability of data and services.

What are the objectives to be pursued for ensuring the security of IT systems?

cybersecurity scada

Data confidentiality: security management in order to mitigate the risks granted to access or use of information in an unauthorized form and obviously the data privacy.

Data integrity: the assurance that the information is not subject to changes or deletions as a result of errors or voluntary actions, but also as a result of malfunctions or damages to technological systems.

Data availability: the safeguarding of IT assets in guaranteeing access, usability, and data confidentiality. From a security management point of view, it means reducing the risks associated with access to information to acceptable levels.

Data and information therefore become vital, since, thanks to technological evolution, we have arrived to have intelligent production systems.

Through IoT (Internet of Things), industrial systems become smart, that is capable to communicate with each other. And it is precisely this communication that can create access holes for hackers. Cyber-attacks, are precisely designed to exploit the vulnerabilities of IoT ecosystems. For this reason, huge amounts of money are invested in the study of hacker behavior, in order to understand how they are able to enter networks and distribute malwares or set up espionage or even sabotage operations.

Cyber Security and Industry 4.0

industry 4.0

Currently, industry 4.0 and cyber security are two issues very present in the Italian media and in companies, as they have a close connection that should be duly taken into consideration by companies that are keen not to expose themselves to serious risks by implementing industry 4.0 solutions.

Cyber security technologies are designed to protect the corporate IT system from external attacks that can cause losses or compromise of sensitive data and information.

Information is a fundamental asset that represents the value of the company and therefore must be protected in the best possible way.

To be sure that your IT system is really attack-proof, it is necessary to rely on specialized companies able to identify the threats and vulnerabilities of the system and then implement the best technologies in order to secure everything.

The benefits of industry 4.0 are many and can be declined in: innovation of process, product, service and management, and significant impacts on plants, products, information and people. To obtain them, companies has to take the most of information technology, now present in any business environment. The result of the extensive use of these IT solutions is the continuous connection of companies, therefore the opening of many windows to the outside, which make the structure vulnerable to cyber-attacks to steal information and know-how.

The first step to cyber security of your business ecosystem is to increase the level of knowledge of security issues at all levels, from the CEO to the CTO up to all the technicians and employees of the company.

To proceed in the best way to protect your company, it is necessary to adopt a “security by design” model, that is to design an infrastructure that takes into account the relevant security issues, paying particular attention to the analysis and assessment of risks and which includes a periodic review of the choices made to identify any countermeasures to be implemented. Creating insurmountable perimeters is not the solution. There are technologies particularly suitable for this purpose such as virtualization, cloud, virtual desktop and thin clients that work on credentials and access control, on inbound and outbound data traffic and on time controlled and close backups, which allow optimal data recovery and quick system recovery.

Movicon.NExT and Cyber Security

Movicon.NExT, Progea SCAD/HMI/MES platform, uses a sophisticated security system in accessing the system, thanks to the management of user authentication based on the use of Memberships.

Thanks to this technology, the platform guarantees maximum security in user management, while maintaining openness to the security provider. It is therefore possible to customize the management of User authentication by customizing the management provider, and using, for example, the opportunities of Windows Passport and integrating biometric recognition systems, in compliance with IEC 62443-3-3.

On 16th June 2020, Movicon.NExT was validated by Lloyd’s Register Quality Assurance Italy with the audit certificate LRC00001153 / 3547690 Rev 1 in compliance with the IEC 62443-3-3 Industrial communication networks – Network and Security System – Part 3- 3: System security requirements and security levels.

This demonstrates that Movicon.NExT is a software platform expressly designed to meet all security requirements necessary for Industry 4.0 automation systems and that the realizable projects are perfectly in line with the requirements mentioned in the IEC 62443 standard.

Share on facebook
Share on twitter
Share on google
Share on linkedin

Cerca qui

Search here

This site uses technical, analytics and third-party cookies. By continuing to browse, you accept the use of cookies.