IT in Manufacturing


SecureIT – basic cyber defence by Yokogawa

August 2016 IT in Manufacturing

With devices, PCs and tablets becoming ever more numerous, it is becoming necessary for all users to perform basic security administration functions.

Individuals can no longer depend on automatic default configurations to maintain a personal secure digital environment. Today, even the least technically savvy user must begin to practice basic cyber defence tasks to keep personal systems and data private.

Cyber defence 101 – for beginners

Cyber defence begins with a mindset or philosophy grounded in the understanding that everyone who uses computing devices is a target. No longer can anyone say with certainty that “they are too small or too unimportant to be a target”. In fact, many small businesses across the world are finding themselves targeted more as larger corporations establish sophisticated security defences.

Being a hacking target is one thing. However, it is also hard for the average user to know where to concentrate their defensive measures. In large corporations, security risk management efforts now quantify a scored hierarchy of importance. Then, after the hierarchy is established, security defence measures are applied to the most critical systems first. Individuals can do this scoring as well. Nevertheless, they should score their most critical systems based on what hackers are most likely to attempt to exploit.

What hackers are after – the money goal

In broad terms, a hacker’s goal is money. Either they are after money directly, or data that leads to money. They want data to get access to money, data to sell for money, or data to use a computer system’s resources to get money. An individual who is only concerned about their bank account could concentrate their cyber defence measures on the one system that has access to their bank (and probably use only one system for bank access too). Given that money is the primary target, a user can now start to organise their digital life so they do not become a victim of cybercrime.

Becoming a less visible cyber target

There is an old joke among cybersecurity professionals: “Two men are walking in a forest. Suddenly a large brown bear appears on the path before them. One of the men calmly starts to tie his shoes. The kneeling man’s companion says, “What are you doing? You know you can’t out run a bear!” To which the kneeling man replied, “I don’t have to outrun the bear ... I only have to outrun you!”

Eventually hackers will compromise systems. But hackers, like everyone else, are resource constrained. If you as an individual make yourself difficult to compromise, most hackers will move on to an easier target.

Cyber defence guidance

The Australian Signals Directorate Top 35 list of mitigation strategies shows that at least 85% of intrusions could have been mitigated by following these top four mitigation strategies:

• Patching applications.

• Patching operating system vulnerabilities.

• Restricting administrator privileges.

• Application Whitelisting.

What follows is an explanation of each of the above.

[1 & 2] Operating system and application updates – basic digital hygiene

For PCs: There is no better high value mitigation than regular OS updates. These should be set to automatic, but if you suspect your computer is out of date and has a Windows OS, simply go to the address below and follow the prompts to see if it needs any critical patches: windowsupdate.microsoft.com

Note: It is extremely important to go to only this designated website. Many malware vendors will redirect or hamper updates so be cautious.

For applications: The following applications should be updated regularly and manually checked to see if they are still the latest versions.

• Web browser.

• Adobe Acrobat.

• Adobe Flash.

• Antivirus.

For Android based devices it is good to allow automatic updates to install and be connected to secure non-public WiFi when doing so.

For Apple devices users are prompted when updates are available. While it is not common for apps to be hacked on Apple, if you have an older app that connects to outside websites (e.g. Facebook) these should be checked to make sure the latest version is installed.

[3] Restrict administrator privileges – keeping the safety features in place

The reason that administrator accounts need to be controlled is obvious. Most home systems simply allow ‘standard users’ to operate as an administrator account, which is a recipe for disaster. The administrator account should be used sparingly, so to limit the privilege is an excellent measure to take.

Use your computing device in User mode; leave the administrator account separate and use it only for true administrative tasks.

[4] Application whitelisting – no rogue programs

A whitelist is a list or register of entities that are given a particular privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognised. Whitelisting is the reverse of Blacklisting, the practice of identifying entities that are denied.

For personal computing application Whitelisting is not very practical. However, the basic principles of Whitelisting can be applied manually to yield some protection. Mitigations like manually monitoring process listings to see if any strange applications are running and then ending any that look suspicious.

How to detect if a system is hacked

There are many ways to detect if your system is hacked, but barring the use of sophisticated forensic tools, a qualitative assessment is best for most users.

Qualitative Indicators of Compromise (IOC):

• System runs slowly, possibly because malware background processes are running.

• System takes overly long to boot, possibly due to hacker hardware drivers loading.

• System makes strange noises at odd times, could be due to malware hardware driver being poorly coded.

• System applications do not run as desired. If System Update, System Restore or Antivirus cannot update, it is highly probable the system has been hacked.

• You find services such as Web searches are redirected to unusual sites, possibly malware/adware compromise.

In general, if you have any of the above happen you should contact an IT professional to resolve the problem. If you are doing this yourself, you can try to download/install Malwarebytes and scan for malware.

Similarly, on a network level, it is highly advisable to monitor network performance and behaviour for unexpected symptoms. A technical report explaining how to monitor networks for security purposes in more detail can be found here ( http://www.yokogawa.com/rd/pdf/TR/rd-te-r05702-007.pdf).

The only way a non-security expert would know if a system is mostly free of malware is for an operating system and antivirus update to occur without being halted. Since almost all malware disables OS and AV updates to keep the initial vulnerability from being fixed.

The United States Department of Homeland Security US Computer Emergency Response Team (US-CERT) recommends that organisations adhere to the following best practices to strengthen the security of their information systems:

• Develop Intrusion Detection System (IDS) signatures to monitor for the aforementioned IOCs.

• Investigate outbound network traffic observed over TCP port 53 that does not conform to the DNS protocol.

• Restrict access or probing of the aforementioned domains and IP addresses.

• Maintain up-to-date antivirus signatures and engines.

• Ensure systems are fully patched and updated; employ least-privileged accounts.

• Restrict user abilities (permissions) to install and run unwanted software applications.

• Enforce a strong password policy and implement regular password changes.

• Exercise caution when opening email attachments, even if the attachment is expected and the sender appears to be known.

• Enable a personal firewall on agency workstations.

• Disable unnecessary services on agency workstations and servers.

• Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its ‘true file type’ (i.e., the extension matches the file header).

• Monitor Web browsing habits and restrict access to sites with unfavourable content.

• Exercise caution when using removable media (e.g. USB thumb drives, external drives, CDs).

• Scan all software downloaded from the Internet prior to executing.

• Maintain situational awareness of the latest threats; implement appropriate access control lists.

• Consider installing Application Whitelisting, Cloud Antivirus and Enhanced Mitigation Experience.

For more information contact Christie Cronje, Yokogawa South Africa, +27 (0)11 831 6300, [email protected], www.yokogawa.com/za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...
Driving digital transformation in the truck industry
Siemens South Africa IT in Manufacturing
Tatra Trucks, a leading truck manufacturer in Czechia, has adopted the Siemens Xcelerator portfolio of industry software including Teamcenter software for product lifecycle management and the Mendix low code platform to help increase production volume and strengthen its ability to manufacture vehicles that meet specific customer requirements.

Read more...
Opinion piece: Digital twins in manufacturing – design, optimise and expand
Schneider Electric South Africa IT in Manufacturing
Digital twin technology can help create better products, fast. It can also transform the work of product development. This strong statement from McKinsey reinforces how far digital twins have come in manufacturing.

Read more...
Asset tracking is key to driving operational excellence and sustainable growth
Schneider Electric South Africa IT in Manufacturing
Asset tracking plays a critical role in the success of industrial businesses. By effectively managing and monitoring assets, companies can optimise their operations, ensuring that resources are used efficiently. This leads to improved productivity and reduced costs.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Predicting and preventing cyber-attacks with AI and generative AI
IT in Manufacturing
The speed at which cyber threats are evolving is unprecedented. As a result, companies need to implement state-of-the-art technology to protect their data and systems.

Read more...
Real-world lessons in digital transformation
IT in Manufacturing
Synthesis has helped businesses across multiple industries with their digital transformation by solving their unique integration challenges.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved