Cybersecurity Attacks and Defenses

by | Jun 21, 2019 | Cybersecurity

Jim Cahill

Chief Blogger, Editor

As analytics continues to turn the vast and growing sea of digital data into useful information, the need for strong cybersecurity also grows. In a CIO Applications article, Addressing the Complex Cyber Security Needs of Digital Manufacturing, Emerson’s Bob Karschnia highlights the collaboration between suppliers and end users to maintain an effective defensive cybersecurity strategy.

CIO Applications: Addressing the Complex Cyber Security Needs of Digital ManufacturingBob opens noting points of vulnerability where industrial wireless networks connect into wired systems. Security considerations must include an end-to-end holistic view of these data handoff points. He explains that security may be applied differently by different suppliers and ultimate responsibility:

…falls to the network managers to review specifications and practices carefully as they implement digital manufacturing projects.

He highlights the common cybersecurity attack vectors:

  • Interference or jamming denial of service (DoS)
  • Bad data DoS
  • Ad-hoc wireless bridges
  • Rogue APs [access points]
  • Man in the middle
  • Reconnaissance and cracking

Cyber defenses should include strategies for access control, network protection through encryption, preserving data confidentiality and integrity, and integrating a solution. This is not a comprehensive list of defenses, but ones that can help address the common attack vectors.

Read the article for more on each of these attack vectors and defensive measures for addressing them.

Visit the Cybersecurity Services section on Emerson.com for more on the strategies, tools and services to help you maintain a robust cybersecurity poster over the life of your manufacturing and production operations. You can also connect and interact with other cybersecurity experts in the Services group in the Emerson Exchange 365 community.

Submit a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Submit a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe for Updates

Follow Us

We invite you to follow us on Facebook, LinkedIn, Twitter and YouTube to keep up to date on all the latest news, events and innovations to help you take on and solve your toughest challenges.

Want to re-purpose, reuse or translate content?

Please do, Just link back to the post and send us a quick note so we can share your work. Thanks!

Our Global Community

Emerson Exchange 365

The opinions expressed here are the personal opinions of the authors. Content published here is not read or approved by Emerson before it is posted and does not necessarily represent the views and opinions of Emerson.