Industrial Security And Installation Guidelines; Industrial Security In Information Technology - YASKAWA PPC021 IE Manual

Hide thumbs Also See for PPC021 IE:
Table of Contents

Advertisement

HMI
5

Industrial security and installation guidelines

5.1 Industrial security in information technology

Latest version
Hazards
Precautions
Further Information
HB160 | PPC | 67S-RTP0 | en | 22-22
This chapter can also be found as a guide 'IIndustrial IT Security' at
www.yaskawa.eu.com
The topic of data security and access protection has become increasingly important in the
industrial environment. The increased networking of entire industrial systems to the net-
work levels within the company together with the functions of remote maintenance have
all served to increase vulnerability. Hazards can arise from:
n
Internal manipulation such as technical errors, operating and program errors and
deliberate program or data manipulation.
n
External manipulation such as software viruses, worms and Trojans.
n
Human carelessness such as password phishing.
The most important precautions to prevent manipulation and loss of data security in the
industrial environment are:
n
Encrypting the data traffic by means of certificates.
n
Filtering and inspection of the traffic by means of VPN - "Virtual Private Networks".
n
Identification of the user by "Authentication" via save channels.
Segmenting in protected automation cells, so that only devices in the same group can
n
exchange data.
n
Deactivation of unnecessary hardware and software.
You can find more information about the measures on the following websites:
n
Federal Office for Information Technology www.bsi.bund.de
n
Cybersecurity & Infrastructure Security Agency us-cert.cisa.gov
n
VDI / VDE Society for Measurement and Automation Technology www.vdi.de
Industrial security and installation guidelines
Industrial security in information technology
59

Advertisement

Table of Contents
loading

This manual is also suitable for:

67s-rtp0

Table of Contents