Tech Briefs Magazine - February 2021 - 16

FACILITY & NETWORK SECURITY
not inherently designed with cybersecurity in mind. Exacerbating the problem is the potential for negative performance impacts resulting from the
integration of common cybersecurity
technologies into existing systems. Balancing accessibility with security is a
multi-faceted strategy that relies on
standard communication protocols,
encryption of data being transferred
over networks, leveraging the most upto-date cybersecurity standards, and
implementation of technologies that
allow identifying and mitigating cybersecurity threats in real time.
Tech Briefs: Obviously, cybersecurity
is a major concern for those deploying Internet of Things (IoT) systems.
Why then is security often the last
element of IoT deployment?
Jabbour: Because cybersecurity is
most easily overlooked. Most IIoT
installations are trying to satisfy a business need and cybersecurity is something that is usually not a standard
conversation topic in business needs
until an attack happens.
Lloyd: Cynically, because security is
always the last element of all deployments. The push for IoT is all about
features and cost. This means devices
are produced quickly, at minimum
price, and you get the security you pay
for. Devices are often not patchable
and cannot support the traditional
agents and scanners in our security
toolsets. So, IoT security is a very hard
problem - effectively, injecting innumerable fragile new devices into a network that was already unruly and disorganized. The transition to IoT will only
go well for those who are disciplined
and plan in advance to contain the
blast radius of problems when - not if
- they occur.
Tindill: There are several reasons
why cybersecurity is considered only at
the end of deployment. Procurement
and sourcing processes exclude cybersecurity requirements because price
remains the primary factor. Most engineering processes exclude cybersecurity - this means that specification,
design, configuration, testing, and
commissioning often occur without
any cybersecurity tasks or deliverables.
IT and cybersecurity teams are excluded until it is time to connect to the net-

work or Internet - this is when these
teams may find out for the first time
the project even exists. Cybersecurity
should have sufficient weight in the
decision criteria; after it is included in
the purchasing processes, it is then
carried through the entire design, configuration, hardening, and cyber accep tance testing, all before launch.

" The role of cybersecurity

is to protect the investment
in the cloud, wireless
sensor networks, and other
industrial systems so they
can deliver their ROI while
being more resilient to
cyberattacks.
Donovan Tindill

"

Pavel: From early days when the
biggest risk was a computer virus, to
today when operational technology
malware can destroy equipment and
lead to loss of life, the computer world
has seen an exponential increase in
cybersecurity attacks. IoT-based technologies provide their own set of
unique security challenges associated
with data integrity, data leakage, privacy, and the potential for unauthorized
access.
So, why is security often the last element of IoT deployment? Some of
these systems were not designed with
cybersecurity in mind but rather with
the sole goal to provide a certain function. End users did not consider cybersecurity as one of their main selection
criteria but rather the ability of a system to perform a task, its efficiency,
and cost. Only in recent years has the
cybersecurity problem become more
emphasized by users, government, and
standardization groups.
Tech Briefs: For manufacturing applications - automation equipment,
robots, etc. - what additional or
different considerations should be
evaluated when assessing what's
needed for a facility network?
Lloyd: The top three priorities for
industrial networks are segmentation,
segmentation, and segmentation. The

16

www.techbriefs.com

Cov

ToC

old air gaps have evaporated and the
Internet is increasingly mixed in to
physical plant operations, whether we
like it or not. This profusion of interfaces means the total attack surface
has exploded and sooner or later,
something is sure to get in. The overriding priority is to plan ahead to limit
the spread of bad events, using segmentation, and for the most critical
systems, to plan ahead to close " blast
doors " similar to the bulkhead doors
in submarines.
Pavel: Cyberattacks have the potential to affect confidentiality, integrity,
and availability in a manufacturing setting. They can lead to loss of product
and process IP; production losses due
to destroying, modifying, and reprogramming parts and processes; damage to reputation; and even injury and
loss of life. The importance of data
integrity for manufacturing can be
seen in relation to part production -
altering product and process specifications could be detrimental to product
quality and reliability.
Data and cyber-physical system availability is also critical to manufacturing
productivity. Legacy hardware and software are commonly used in manufacturing processes and some of these systems were not designed with cybersecurity or the IoT in mind. Therefore,
there is an inherent risk when connecting such legacy devices to IoT or integrating them into the factory network.
Tech Briefs: Where factory floor, corporate, and Internet connections coexist, are firewalls a sufficient option
for cyber protection?
Jabbour: Absolutely not. Firewalls
are but a single appliance of a total system and while they should be used,
other design considerations must be
taken into account.
Tindill: In the mid-1990s, firewalls
and antivirus were the standards because they provided sufficient safeguards to defend against the cybersecurity threats of the time. Virtually 100%
of organizations today have firewalls
and cyberattacks can bypass firewalls
with other tactics, techniques, and procedures (TTPs). Cyber threats are rapidly evolving and multiple cybersecurity controls are required. Firewalls fulfill primarily a protective control, good
Tech Briefs, February 2021


http://www.techbriefs.com http://www.abpi.net/ntbpdfclicks/l.php?202102TBNAV

Tech Briefs Magazine - February 2021

Table of Contents for the Digital Edition of Tech Briefs Magazine - February 2021

Tech Briefs Magazine - February 2021 - Intro
Tech Briefs Magazine - February 2021 - Cov IV
Tech Briefs Magazine - February 2021 - Cov I
Tech Briefs Magazine - February 2021 - Cov II
Tech Briefs Magazine - February 2021 - 1
Tech Briefs Magazine - February 2021 - 2
Tech Briefs Magazine - February 2021 - 3
Tech Briefs Magazine - February 2021 - 4
Tech Briefs Magazine - February 2021 - 5
Tech Briefs Magazine - February 2021 - 6
Tech Briefs Magazine - February 2021 - 7
Tech Briefs Magazine - February 2021 - 8
Tech Briefs Magazine - February 2021 - 9
Tech Briefs Magazine - February 2021 - 10
Tech Briefs Magazine - February 2021 - 11
Tech Briefs Magazine - February 2021 - 12
Tech Briefs Magazine - February 2021 - 13
Tech Briefs Magazine - February 2021 - 14
Tech Briefs Magazine - February 2021 - 15
Tech Briefs Magazine - February 2021 - 16
Tech Briefs Magazine - February 2021 - 17
Tech Briefs Magazine - February 2021 - 18
Tech Briefs Magazine - February 2021 - 19
Tech Briefs Magazine - February 2021 - 20
Tech Briefs Magazine - February 2021 - 21
Tech Briefs Magazine - February 2021 - 22
Tech Briefs Magazine - February 2021 - 23
Tech Briefs Magazine - February 2021 - 24
Tech Briefs Magazine - February 2021 - 25
Tech Briefs Magazine - February 2021 - 26
Tech Briefs Magazine - February 2021 - 27
Tech Briefs Magazine - February 2021 - 28
Tech Briefs Magazine - February 2021 - 29
Tech Briefs Magazine - February 2021 - 30
Tech Briefs Magazine - February 2021 - 31
Tech Briefs Magazine - February 2021 - 32
Tech Briefs Magazine - February 2021 - 33
Tech Briefs Magazine - February 2021 - 34
Tech Briefs Magazine - February 2021 - 35
Tech Briefs Magazine - February 2021 - 36
Tech Briefs Magazine - February 2021 - 37
Tech Briefs Magazine - February 2021 - 38
Tech Briefs Magazine - February 2021 - 39
Tech Briefs Magazine - February 2021 - 40
Tech Briefs Magazine - February 2021 - 41
Tech Briefs Magazine - February 2021 - 42
Tech Briefs Magazine - February 2021 - 43
Tech Briefs Magazine - February 2021 - 44
Tech Briefs Magazine - February 2021 - 45
Tech Briefs Magazine - February 2021 - 46
Tech Briefs Magazine - February 2021 - 47
Tech Briefs Magazine - February 2021 - 48
Tech Briefs Magazine - February 2021 - 49
Tech Briefs Magazine - February 2021 - 50
Tech Briefs Magazine - February 2021 - 51
Tech Briefs Magazine - February 2021 - 52
Tech Briefs Magazine - February 2021 - 53
Tech Briefs Magazine - February 2021 - 54
Tech Briefs Magazine - February 2021 - 55
Tech Briefs Magazine - February 2021 - 56
Tech Briefs Magazine - February 2021 - Cov III
Tech Briefs Magazine - February 2021 - Cov IV
Tech Briefs Magazine - February 2021 - [MD] Cov I
Tech Briefs Magazine - February 2021 - [MD] Cov II
Tech Briefs Magazine - February 2021 - [MD] 1
Tech Briefs Magazine - February 2021 - [MD] 2
Tech Briefs Magazine - February 2021 - [MD] 3
Tech Briefs Magazine - February 2021 - [MD] 4
Tech Briefs Magazine - February 2021 - [MD] 5
Tech Briefs Magazine - February 2021 - [MD] 6
Tech Briefs Magazine - February 2021 - [MD] 7
Tech Briefs Magazine - February 2021 - [MD] 8
Tech Briefs Magazine - February 2021 - [MD] 9
Tech Briefs Magazine - February 2021 - [MD] 10
Tech Briefs Magazine - February 2021 - [MD] 11
Tech Briefs Magazine - February 2021 - [MD] 12
Tech Briefs Magazine - February 2021 - [MD] 13
Tech Briefs Magazine - February 2021 - [MD] 14
Tech Briefs Magazine - February 2021 - [MD] 15
Tech Briefs Magazine - February 2021 - [MD] 16
Tech Briefs Magazine - February 2021 - [MD] 17
Tech Briefs Magazine - February 2021 - [MD] 18
Tech Briefs Magazine - February 2021 - [MD] 19
Tech Briefs Magazine - February 2021 - [MD] 20
Tech Briefs Magazine - February 2021 - [MD] 21
Tech Briefs Magazine - February 2021 - [MD] 22
Tech Briefs Magazine - February 2021 - [MD] 23
Tech Briefs Magazine - February 2021 - [MD] 24
Tech Briefs Magazine - February 2021 - [MD] Cov III
Tech Briefs Magazine - February 2021 - [MD] Cov IV
https://www.nxtbook.com/smg/techbriefs/24TB04
https://www.nxtbook.com/smg/techbriefs/24TB03
https://www.nxtbook.com/smg/techbriefs/24TB02
https://www.nxtbook.com/smg/techbriefs/24TB01
https://www.nxtbook.com/smg/techbriefs/23TB12
https://www.nxtbook.com/smg/techbriefs/23TB11
https://www.nxtbook.com/smg/techbriefs/23TB10
https://www.nxtbook.com/smg/techbriefs/23TB09
https://www.nxtbook.com/smg/techbriefs/23TB08
https://www.nxtbook.com/smg/techbriefs/23TB07
https://www.nxtbook.com/smg/techbriefs/23TB06
https://www.nxtbook.com/smg/techbriefs/23TB05
https://www.nxtbook.com/smg/techbriefs/23TB04
https://www.nxtbook.com/smg/techbriefs/23TB03
https://www.nxtbook.com/smg/techbriefs/23TB02
https://www.nxtbook.com/smg/techbriefs/23TB01
https://www.nxtbook.com/smg/Testing/22TB12
https://www.nxtbook.com/smg/techbriefs/22TB12
https://www.nxtbook.com/smg/techbriefs/22TB11
https://www.nxtbook.com/smg/techbriefs/22TB10
https://www.nxtbook.com/smg/techbriefs/22TB09
https://www.nxtbook.com/smg/techbriefs/22TB08
https://www.nxtbook.com/smg/techbriefs/22TB07
https://www.nxtbook.com/smg/techbriefs/22TB06
https://www.nxtbook.com/smg/techbriefs/22TB05-P
https://www.nxtbook.com/smg/techbriefs/22TB05-D
https://www.nxtbook.com/smg/techbriefs/22TB04
https://www.nxtbook.com/smg/techbriefs/22TB03
https://www.nxtbook.com/smg/techbriefs/22TB02
https://www.nxtbook.com/smg/techbriefs/22TB01
https://www.nxtbook.com/smg/techbriefs/21TB12
https://www.nxtbook.com/smg/techbriefs/21TB11
https://www.nxtbook.com/smg/techbriefs/21TB10
https://www.nxtbook.com/smg/techbriefs/21TB09
https://www.nxtbook.com/smg/techbriefs/21TB08
https://www.nxtbook.com/smg/techbriefs/21TB07
https://www.nxtbook.com/smg/techbriefs/21TB06
https://www.nxtbook.com/smg/techbriefs/21TB05
https://www.nxtbook.com/smg/techbriefs/21TB04
https://www.nxtbook.com/smg/techbriefs/21BT03
https://www.nxtbook.com/smg/techbriefs/21TB02
https://www.nxtbookmedia.com