IT in Manufacturing


Providing secure access to ­manufacturing data

March 2014 IT in Manufacturing

The proliferation of industrial Ethernet today is putting manufacturing at risk for inadvertent and deliberate intrusions. Security measures tailored specifically for production environments are imperative for keeping operations protected – and profitable.

Security today is a necessary part of every manufacturing operation that expects to run smoothly, efficiently, safely and profitably. But protecting the industrial environment is far from an easy job. As production equipment and the systems that connect and control it grow increasingly more complex and sophisticated, the measures needed to protect them become more critical as well.

Fuelling these developments in large part is the recent evolution of Ethernet technology from the office enterprise to the industrial environment. Once thought to be insufficiently robust and lacking in functionality, industrial Ethernet (standardised Ethernet communications over a hardened networking infrastructure) has advanced remarkably, becoming, in a few short years, the communications staple of manufacturing and production, of automation and control.

Although it offers many benefits, industrial Ethernet is not without issues, especially in terms of security. It typically must carry signals between devices on a precise, exacting schedule. While standard Ethernet in the office environment may be unharmed by a signal transmission fault, it is a different story in the industrial world. Networks here must be able to withstand harsh and hazardous environments with little margin for error. Downtime caused by a security breach on the manufacturing side – whether it is from an inadvertent or unintentional error or from a deliberate cyber attack – is always expensive and can put assets at risk.

A changing landscape: the genesis of industrial Ethernet

Before the advent of industrial Ethernet, industrial networks were not as susceptible to cyber security incidents as their enterprise brethren. Security flaws inherent initially in enterprise infrastructures made them prime targets of the cyber underworld. However, relying predominantly on such fieldbus network protocols as Foundation fieldbus, Modbus, or Profibus that used proprietary RS-232 or RS-485 serialised communications, industrial networks were essentially closed with minimal connection to the outside world. They were rarely affected by the network vulnerabilities and attacks that plagued enterprise environments. Isolated and independent, the industrial world rarely shared a common communications path with the enterprise environment, and even rarer was the person skilled enough to attack both realms.

When industrial companies began seeking a common networking platform that could be leveraged for office and plant floor alike, Ethernet seemed the likely prospect. In fact, it wasn’t long before Ethernet became the de facto standard for the company striving to modernise its business by incorporating the power of computing into their business models.

Using common protocols over standardised networking equipment brought many advantages to industrial and enterprise networks. Thanks to interconnected enterprise and industrial networks, seamless interoperability from the shop floor to the front office made multi-network connectivity, anytime, anywhere, a reality.

Corporations with multiple geographical locations could be united as if in a single building. Multifaceted organisational and commercial entities could more easily collaborate, simplifying intersystem relationships. Yet these advantages are the very cause of the vulnerabilities and weaknesses that expose industrial networks to many of the same security woes of the enterprise network. In some cases, even more.

Web exlusive: to find out more about the Belden’s approach to protecting the industrial operation through defence-in-depth security, visit http://instrumentation.co.za/+C18686

For more information contact Greg Pokroy, Jaycor International, +27 (0)21 447 4247, [email protected], www.jaycor.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...
Quantum computing power: four steps to protecting your business
IT in Manufacturing
Are you ready for Q-day? Post-quantum cryptography isn’t just an IT issue, it’s a business continuity concern. Quantum computing is fast becoming a reality.

Read more...
Schneider Electric relaunches legacy access control systems
Schneider Electric South Africa IT in Manufacturing
Schneider Electric South Africa has relaunched its comprehensive access control platform to help customers upgrade from ageing and obsolete systems.

Read more...
Digitalisation in mining - the advantage you need now
Schneider Electric South Africa IT in Manufacturing
Digitalisation offers immense and proven benefits such as streamlining operations, reducing error and accelerating workflows. Mining operators today leverage digital technologies to improve efficiency, sustainability and very importantly, safety.

Read more...
The shape of water – automating hydropower operations
Schneider Electric South Africa IT in Manufacturing
Hydropower is undoubtedly one of the building blocks of today’s renewable energy industry and its operations need to be efficient, reliable and sustainable. Automation must therefore form part of today’s modern hydropower operations to improve resource management and enhance reliability.

Read more...
What lies beneath – the hidden cost of AI
Schneider Electric South Africa IT in Manufacturing
The world is quickly realising that with the rapid advancement in AI there are also caveats. In short, apart from environmental implications, it also has major significant financial ramifications.

Read more...