Industrial Security And Installation Guidelines; Industrial Security In Information Technology - YASKAWA iC9200 Series Operating Manual

Hide thumbs Also See for iC9200 Series:
Table of Contents

Advertisement

iC9200 Series
2.8

Industrial security and installation guidelines

2.8.1

Industrial security in information technology

Latest version
Hazards
Precautions
Further Information
HB700 | CPU | PMC921xEx | en | 24-04
Industrial security and installation guidelines > Industrial security in information technology
This chapter can also be found as a guide 'Industrial IT Security' in the 'Download Center'
of
⮫ www.yaskawa.eu.com
The topic of data security and access protection has become increasingly important in
the industrial environment. The increased networking of entire industrial systems to the
network levels within the company together with the functions of remote maintenance
have all served to increase vulnerability. Hazards can arise from:
Internal manipulation such as technical errors, operating and program errors and
deliberate program or data manipulation.
External manipulation such as software viruses, worms and trojans.
Human carelessness such as password phishing.
The most important precautions to prevent manipulation and loss of data security in the
industrial environment are:
Encrypting the data traffic by means of certificates.
Filtering and inspection of the traffic by means of VPN - "Virtual Private Networks".
Identification of the user by "Authentication" via save channels.
Segmenting in protected automation cells, so that only devices in the same group can
exchange data.
Deactivation of unnecessary hardware and software.
You can find more information about the measures on the following websites:
Federal Office for Information Technology
Cybersecurity & Infrastructure Security Agency
VDI / VDE Society for Measurement and Automation Technology
Basics and mounting
⮫ www.bsi.bund.de
⮫ us-cert.cisa.gov
⮫ www.vdi.de
51

Advertisement

Table of Contents
loading

Table of Contents