Possible Corporate Security Holes - Siemens SIMOTION P320-4 E Manual

Table of Contents

Advertisement

● Worldwide remote access to plants, machines and mobile applications
● The "Internet of things"
Millions of electronic devices are becoming network-capable and are communicating via
the Internet, such as onboard computers in cars, which send warranty information to
dealers, or water meter sensors that transmit water consumption data to municipal water
suppliers via radio.
However, in order for everything from cloud computing to sensors to work without service
disruptions, you need reliable network infrastructures that are well protected against attacks
from malware and hackers.
2.2.2

Possible corporate security holes

Possible security holes or weak points
The security chain of a company is only as strong as its weakest link. Security holes can exist
at numerous points. The following list gives only a few examples:
● Employees
● Production plants
● Network infrastructure
● Data centers
● PC workstations
● Laptops
● Tablet PCs
● Printers
● Smartphones
● Portable storage media
● Guidelines and regulations
For this reason, a holistic approach is required to deal with the issue of security. Coordinated
guidelines and regulations are required that cover all areas: Devices, systems, processes and
employees.
SIMOTION P320-4 E / P320-4 S
Manual, 03/2018, A5E36004933B
2.2 Why is industrial security so important?
Industrial security
25

Advertisement

Table of Contents
loading

This manual is also suitable for:

Simotion p320-4 sSimotion p320-4 e

Table of Contents