EasyManua.ls Logo

YASKAWA iC9000 Series - Industrial Security and Installation Guidelines; Industrial Security in Information Technology

YASKAWA iC9000 Series
138 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
25
2.2 Industrial Security and Installation Guidelines
This chapter provides information on industrial security in information technology and installation guidelines.
2.2.1 Industrial security in information technology
Hazards The topic of data security and access protection has become increasingly important in the industrial environ-
ment. The increased networking of entire industrial systems to the network levels within the company together
with the functions of remote maintenance have all served to increase vulnerability. Hazards can arise from:
Internal manipulation such as technical errors, operating and program errors and deliberate program or data
manipulation.
External manipulation such as software viruses, worms and Trojans.
Human carelessness such as password phishing.
Precautions The most important precautions to prevent manipulation and loss of data security in the industrial environment
are:
Encrypting the data traffic by means of certificates.
Filtering and inspection of the traffic by means of VPN - "Virtual Private Networks".
Identification of the user by "Authentication" via save channels.
Segmenting in protected automation cells, so that only devices in the same group can exchange data.
Deactivation of unnecessary hardware and software.
Further information You can find more information about the measures on the following websites:
Federal Office for Information Technology https://www.bsi.bund.de/EN/Home/home_node.html
Cybersecurity & Infrastructure Security Agency us-cert.cisa.gov
VDI / VDE Society for Measurement and Automation Technology www.vdi.de/en/home
IEC 62443 Security for industrial automation and control systems https://www.iec.ch/blog/understanding-iec-
62443
2.2 Industrial Securit
y
and Installation Guidelines
2
Overview

Table of Contents

Related product manuals