Cybersecurity Attacks and Defenses

by | Jun 21, 2019 | Cybersecurity | 0 comments

As analytics continues to turn the vast and growing sea of digital data into useful information, the need for strong cybersecurity also grows. In a CIO Applications article, Addressing the Complex Cyber Security Needs of Digital Manufacturing, Emerson’s Bob Karschnia highlights the collaboration between suppliers and end users to maintain an effective defensive cybersecurity strategy.

CIO Applications: Addressing the Complex Cyber Security Needs of Digital ManufacturingBob opens noting points of vulnerability where industrial wireless networks connect into wired systems. Security considerations must include an end-to-end holistic view of these data handoff points. He explains that security may be applied differently by different suppliers and ultimate responsibility:

…falls to the network managers to review specifications and practices carefully as they implement digital manufacturing projects.

He highlights the common cybersecurity attack vectors:

  • Interference or jamming denial of service (DoS)
  • Bad data DoS
  • Ad-hoc wireless bridges
  • Rogue APs [access points]
  • Man in the middle
  • Reconnaissance and cracking

Cyber defenses should include strategies for access control, network protection through encryption, preserving data confidentiality and integrity, and integrating a solution. This is not a comprehensive list of defenses, but ones that can help address the common attack vectors.

Read the article for more on each of these attack vectors and defensive measures for addressing them.

Visit the Cybersecurity Services section on Emerson.com for more on the strategies, tools and services to help you maintain a robust cybersecurity poster over the life of your manufacturing and production operations. You can also connect and interact with other cybersecurity experts in the Services group in the Emerson Exchange 365 community.

Popular Posts

Comments

Author

Follow Us

We invite you to follow us on Facebook, LinkedIn, Twitter and YouTube to stay up to date on the latest news, events and innovations that will help you face and solve your toughest challenges.

Do you want to reuse or translate content?

Just post a link to the entry and send us a quick note so we can share your work. Thank you very much.

Our Global Community

Emerson Exchange 365

The opinions expressed here are the personal opinions of the authors. Content published here is not read or approved by Emerson before it is posted and does not necessarily represent the views and opinions of Emerson.

PHP Code Snippets Powered By : XYZScripts.com