Smart Factory

2017/07/06

Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity

Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the Internet. While, this connectivity helped to improved the efficiency, security was at best a minimal consideration.

2017/05/03

Rogue Robots: Testing Industrial Robot Security

Rogue Robots: Testing Industrial Robot Security

Industrial robots have replaced humans in a lot of large-scale production and manufacturing activities because of their efficiency, accuracy, and safety. These mechanical, programmable devices can now be seen in practically all industrial sectors?making cars, fabricating airplane parts, assembling food products, and even providing critical public services.

2017/04/04

Smart Factory Security Part 3: Ransomware countermeasures for factory operations

Smart Factory Security Part 3: Ransomware countermeasures for factory operations

While transitioning from regular factories to smart factories, the gap in awareness between information technology (IT) and operational technology (OT) security measures is one of the most crucial challenges to overcome. In this blog, we will take a look at the threat of ransomware. It will be used as an example to look at the current state of cyberattacks that significantly impact the stability of connected factory operations, as well as effective security measures that can be practiced.

2017/01/31

Smart Factory Security Part 2: What Management Should Know in Securing a Factory

Smart Factory Security Part 2: What Management Should Know in Securing a Factory

Regardless of whether a factory becomes a smart factory or not, truly effective security measures are not something that can be achieved through responses in the field or system changes alone. In order to protect a business’s continuity from security threats, it is necessary for management to correctly understand its importance and relay courses of action to the field.

2017/01/26

Why Do Attackers Target Industrial Control Systems?

Why Do Attackers Target Industrial Control Systems?

Industrial Control Systems (ICS) are found everywhere–from automated machines that manufacture goods to an office building’s cooling system.
Previously, it was standard that ICS were based on specific OS and specific communication protocols. However, in recent years, system development costs have been reduced and productivity has been improved by implementing network connection based on general purpose OS and standard communication protocols.

2016/12/02

Smart Factory Security Part 1: Looking at the impact of poor cybersecurity in factories

Smart Factory Security Part 1: Looking at the impact of poor cybersecurity in factories

Through internet of things (IoT), traditional factories are becoming smart factories. Cybersecurity threats in factories and the necessity of establishing countermeasures will be explained in two parts. This first part explains cybersecurity threats in factories and the necessity of establishing suitable countermeasures.

2016/03/30

Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers

Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers

If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security posture.

2014/07/23

Smart Grid Attack Scenarios

Smart Grid Attack Scenarios

In this post, we’ll look at the risks when smart grids are attacked. Smart grids pertain to an electric grid with digital information/communication capabilities for recording information on both consumers and suppliers. What differentiates an attack on a smart grid from an attack on a smart meter? Simply put, scale: an attack on a smart grid affects many more users than an attack on an individual meter. The potential for damage is proportionately much more significant.

2014/07/21

Smart Meter Attack Scenarios

Smart Meter Attack Scenarios

Perhaps the most obvious risk is simple: meter tampering. If a smart meter can be hacked, inaccurate information can be sent back to the utility, allowing an attacker to adjust the reading and resulting in an inflated bill. Let’s say, for example, that you have an argument with your neighbor. In revenge, if he can access your smart meter, you might see a rather large electric bill.

2014/07/14

Introduction to Smart Meters

Introduction to Smart Meters

What is a smart meter, exactly? It’s a meter for utilities (electricity, gas, or water) that records the consumption of the utility in question, and transmits it to the utility provider via some sort of two-way communication method. (Examples of these methods include a wireless mesh network, power line networking, or a connection to the user’s own Internet service.)

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop