This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Cyber safety – what happens next?

01 March 2013

Recent industrial incidents have provided a timely reminder of the importance of taking effective measures to protect process control systems and infrastructure from attacks from cyberspace. Thomas Lantermann, senior business development manager at Mitsubishi Electric Europe B.V., Factory Automation – European Business Group, looks at where vulnerabilities lie and how the problem will be exacerbated in the future, and looks at new security standards that offer protection.

Cyber criminality is developing into a danger which should be taken ever more seriously, and which is assuming sometimes unimagined dimensions. High profile incidents involving malware have shown that the typical automation architecture has weak points and vulnerabilities when it comes to security, and this is leading many companies to question the traditional methods used to move information around, in particular from the plant/asset level to the enterprise level.

Today, Mitsubishi Electric is working on developing new security standards. Consideration is also being given to very basic gaps in security, such as unprotected connections to the Internet. Corresponding protective measures, which support systematic IT security and minimise the area open to attack for viruses, worms and Trojans are indispensable.

When we look at the attacks from the Stuxnet malware, what we see is that it changed the point of attack on a business from the seemingly secure top end to the somewhat vulnerable middle ground – the PC hardware and software that lies between the plant floor control systems and the higher level enterprise systems. In particular, the communications gateway systems that exist to provide an information bridge between the plant floor and the wider enterprise systems. These gateway systems have been identified as a point of weakness in system security, vulnerable to attacks from outside, as well as to viruses brought in accidentally on CDs, memory cards and USB sticks.

Being networked, and containing software to influence the control layers below and the information layers above, these PCs are often attractive targets to anyone the outside world looking to disrupt operations. Coupled to this is the fact that many of these PCs may well have been poorly maintained in terms of security patches, or will be running unsupported legacy versions of operating systems, raising the risk factors considerably.

Many IT security systems are designed to mitigate against attacks on PC-based systems. However, these solutions are more focused on dealing with the problem and protecting the weak points than understanding how the problem might have occurred and eliminating the weak points.

Mitsubishi Electric’s approach is different, with the objective of separating these mass storage devices such as PCs from the operating system, and only retaining peripheral drivers which are relevant to control. To do this, technology is needed which challenges the traditional automation architecture.

Rather than having a layer of gateway PCs in the automation structure, instead, the required software tools are integrated on an already existing robust hardware platform such as the PAC platform. We address the requirements for control and information that would previously have existed as PC software in the gateway layer through products and solutions such as MES-IT, C Connector, C Batch and remote terminal units (RTUs).

The IT interface module MES-IT, developed jointly with e-F@ctory Alliance Partner ILS Technology, represents an uncomplicated, direct connection from process systems at field level to ERP or MES databases and systems at company level. It collects production data and test results in each phase of production and transfers the data directly to higher level systems. This means that quality control can be improved. Decisions based on real-time information can also increase profitability. Traceability is also extremely high here: each product manufactured, regardless of whether it is still in the production process or is already in the warehouse, can be followed up accurately and the material flow can therefore be controlled more precisely.

Similarly to MES-IT, the PAC module C connector supplies real time information from the whole automation system directly into the user’s SAP system. However, this solution can be operated even more intuitively due to preconfigured templates. The module simplifies cross-platform, vertical integration of the production level in MES and ERP systems through a bi-directional data exchange. Here, too, the PC, as a gap in security, is consciously dispensed with. Efficiency is increased, as products can be manufactured practically ‘on demand’. Time and costs can be saved because of the ease with which the system can be installed and integrated. An IT specialist is not needed. Even additional components such as controllers or RFID readers from other manufacturers can be integrated quite readily.

A solution for the control of batch processes in real time is the batch control system, C Batch, from Mitsubishi Electric and INEA, another e-F@ctory Alliance partner. This batch management solution can reduce the complexity of traditional process control architectures. The batch system is not PC-based, instead being based on a standard control platform.
This means that rejects and waste can be kept to a minimum. Lines and plants are configured and not programmed, recipes can easily be reused and compliance with ISA standards such as S88 becomes easier as the system was designed to comply from inception.

These technologies create the possibility of removing the gateway PC from the enterprise topology altogether. By eliminating the PC level, additional crash security and a high transfer speed are guaranteed as well as mitigating from the dangers from cyberspace.


Contact Details and Archive...

Related Articles...

Most Viewed Articles...

Additional Information...

Print this page | E-mail this page