September 2019CIOAPPLICATIONS.COM 19igital manufacturing runs on data, and while today's networks are highly sophisticated, they still require data entry, collection, storage and distribution to automate or improve upon tasks previously done manually. Every time data moves from one step to the next or gets handed off from one part of a network to another; it creates an opportunity for theft or manipulation. Today's digital manufacturing applications typically use a mix of wired and wireless communication on interconnected networks for transmitting data collected by sensors to host systems. Industrial wireless networks connect to wired systems to hand off data, introducing possible points of vulnerability. This means someone trying to secure the network must look at the infrastructure from end-to-end to create an effective defensive strategy.Operations technology (OT) personnel have to move data to IT systems so management and accounting can access it. If a hacker can find a vulnerability in the OT applications and networks, this can often provide a path to move into the IT networks. This is a tried-and-true method since OT networks are usually not as well protected as IT networks. Adding industrial wireless networks and extensions make the problem worse by creating additional hand-off points and a larger attack surface. DUnfortunately, the ways security gets applied with industrial wireless devices and networks is uneven, to put it mildly. Most claim some degree of encryption, but if it is not applied well, it can be circumvented. It falls to the network managers to review specifications and practices carefully as they implement digital manufacturing projects.Prying Open the DoorWhile hackers are often very clever, the majority have to depend on a handful of established cyber burglar tools. Here are some of the most common, in order of sophistication and difficulty.Interference or jamming denial of service (DoS)The easiest attack is simply to disrupt radio communication by creating high amounts of electromagnetic interference. This can be gross and aim at a wide spectrum, or more sophisticated, zeroing in on specific frequencies. cXo insightsAddressing the Complex Cyber Security Needs of Digital ManufacturingBOB KARSCHNIA, VP OF WIRELESS, EMERSON AUTOMATION SOLUTIONS
< Page 9 | Page 11 >