DCS; Industrial control system
NameDescriptionContent
NEW CENTER
Current Location:

Cybersecurity and Digitalization: A Cautionary Tale

来源:automation | 作者:H | 发布时间 :170 days ago | 42 次浏览: | Share:
Cybersecurity and Digitalization: A Cautionary Tale
Cybersecurity and Digitalization: A Cautionary Tale

Digital transformation across the industrial sector has been a work in progress for years, but the push to increase connectivity from the executive suite to HR and accounting to the manufacturing floor is becoming even more acute.

It only makes sense, as digital technologies can drive improved quality control, boost efficiency gains, reduce costs, enable better environmental controls, and create a stronger, more quality product. Not only is digitalization changing the stigma of manufacturing being a musty old environment, but it is also turning the sector into a glistening new workplace employing state-of-the-art technology that allows organizations to take on any competitor across the globe.

As these benefits allow for improved efficiency, faster decision-making, increased equipment uptime, improved supply chain management, reduced errors, faster turnaround times, and decreased costs, the key ingredient to this digital recipe is cybersecurity.

“Digitalization is rapidly expanding, making cybersecurity an essential backbone for sustaining digital enterprises,” said Dewan Chowdhury, chief executive and founder of cybersecurity provider, malcrawler. “The recent Microsoft-CrowdStrike incident highlighted the potential risks of an unsecured digital environment.”

The scenario leading to the Microsoft-CrowdStrike incident had the CrowdStrike Falcon sensor delivering artificial intelligence (AI) and machine learning to protect systems by identifying and remediating advanced threats. In February 2024, CrowdStrike introduced a new sensor capability. On 19 July 2024, a Rapid Response Content update went out to certain Microsoft Windows hosts with the new capability first released in February, CrowdStrike officials said. The sensor expected 20 input fields, while the update provided 21 input fields. In this instance, the mismatch resulted in an out-of-bounds memory read, causing a system crash that affected 8.5 million computers globally and cost companies $5.4 billion.

“While this particular issue resulted from an internal error, it raises concerns about the consequences if an attacker deliberately seeks to cause harm,” Chowdhury said. “This situation demonstrates the critical need for integrating people, processes and technology to enhance cybersecurity in the digital age.”
 

Multiple threats

With increased connectivity in the digital environment, there are more opportunities for threat actors to hit manufacturers with multiple types of attacks including terrorists, hacktivism, supply chain disruption and ransomware.

To that end, one ransomware attack on a German bicycle maker halted production, invoicing and deliveries for three weeks. According to a report in the ICSSTRIVE.com incident repository, disrupted supply chains meant required parts did not arrive so workers could not assemble and deliver the bicycles. As a result of the attack, the company filed for bankruptcy.

While there are plenty of reasons why a company might go out of business, many factors can come into play. Some of these include having a digital environment moving forward with a lack of qualified cybersecurity professionals; problems with elements like artificial intelligence (AI), machine learning, training, education, planning, or even cloud computing could be a cause.

“The age of digitalization, including machine learning and AI is here,” said Mark Carrigan, senior vice president of process safety and OT cybersecurity at Hexagon. “The current and potential benefits these technologies can provide are compelling and will transform how we conduct business.”

With digitalization here to stay, security experts across the board can’t stress enough that having the right people, processes and technologies in place is vital. “Combining skilled personnel, effective processes, and advanced technology is crucial for bolstering cybersecurity,” Chowdhury said. “The shortage of qualified cybersecurity professionals poses a significant challenge. In response, organizations must rely more on artificial intelligence to automate threat detection and response. AI can analyze vast amounts of data quickly, identifying potential threats and mitigating risks, thus compensating for the lack of human resources.”

New cyber education programs are earning funding from multiple sources to help bolster workforce competency.
 


Creating cyber-skilled workers

The skills gap is a huge issue with an average of 3.4 million industrial cybersecurity open positions globally with more than 410,695 of those jobs in the U.S. alone, according to a report from (ICS)2, an international nonprofit membership association focused on inspiring a safe and secure cyber world.

Cyber education is one aspect continuing to grow to help fill that gap. (See “Adding ‘Industrial’ to Cybersecurity Education elsewhere in this issue.) Indeed, new programs are earning funding from multiple agencies to help bolster the workforce.

Arizona State University’s School of Computing and Augmented Intelligence, part of the Ira A. Fulton Schools of Engineering just earned a two-year, $4.5 million grant from the U.S. Defense Advanced Research Projects Agency (DARPA) to establish an institute that will develop national and global cybersecurity educational standards and curriculums designed to address critical workforce shortages.

The University of Texas at San Antonio (UTSA) created a new college dedicated to AI, cybersecurity, computing, data science and related disciplines.

A cybersecurity scholarship program is also starting up at the College of Engineering and Computer Science at Florida Atlantic University (FAU) since it received a $2.6 million grant from the National Science Foundation (NSF).

In addition, grants worth approximately $200,000 addressing the nation’s shortage of skilled cybersecurity employees will be awarded to 18 education and community organizations in 15 states. These grants are a part of the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) program that awarded cooperative agreements of nearly $3.6 million to build the workforce needed to safeguard enterprises from cybersecurity risks.

According to the U.S. Department of Homeland Security, cybersecurity threats to critical infrastructure are one of the country’s greatest strategic risks. Grants and awards have increased due to this. The Internet Crime Report, compiled annually by the Federal Bureau of Investigation, charts growth in cybercrime, noting a record number of complaints in 2023 with $12.5 billion in reported financial losses.


Employee training

Continuous training and education for employees also plays a vital role in maintaining a strong cybersecurity posture. “A well-informed staff can recognize and respond to potential threats more effectively, reducing the likelihood of breaches caused by human error,” Chowdhury said. “As technology evolves, ongoing education ensures that employees remain up to date with the latest security practices and tools.”

Part of that ongoing education is evolving from the continuing convergence of information technology (IT) and operational technology (OT) systems and knowledge. “Applying these digital techniques to the OT world, whether to improve productivity, insights, or cybersecurity, will be more difficult than in the IT world,” Carrigan said. “The reason is there are key differences between IT and OT that will not change anytime soon.”

Carrigan indicated that these differences relate to:

  • Flexibility. IT assets are generally flexible. A single server or PC may conduct a variety of tasks or host multiple applications. OT assets have a specific mission, highly customized to deliver specific tasks to control or monitor operations.

  • Security versus availability. In general, in the IT world, security takes precedence over availability. Often, on short notice, IT can shut down an asset to install critical security updates. In OT, the opposite is true. These assets must be available 24/7 and often do not update with the most recent security capabilities to avoid unnecessary downtime.

  • New versus old. In the IT world, assets typically have a relatively short life (three to five years) before an upgrade. In OT it is common to have assets that are more than 20 years old controlling critical infrastructure. The cost to upgrade these assets—in both cash outlays and disruptions to the business—means they have an extended life.

  • Homogeneous versus heterogeneous systems. In general, IT assets use a limited number of operating systems (Microsoft, Apple OS, Linux, etc.) and protocols to communicate. OT assets end up dominated by vendor-specific operating systems, protocols, and other designs unique and proprietary to each vendor. Integration in the OT world is typically more complicated and customized compared to IT.

Those differences must be considered when applying machine learning or AI to an OT environment, Carrigan said. “As an example, technologies are available to detect and automatically intervene to stop a cyberattack,” he explained. “These capabilities are becoming common in the IT world and will be further enhanced by leveraging AI techniques. Applying these same technologies in the OT world carries much more risk—any system that automatically interrupts the actions of an OT system could lead to significant loss of production or equipment damage—the same consequences we are trying to avoid via cyberattacks.”

Carrigan added: “The key differences between IT and OT, which will remain for years, means there must be more care when considering machine learning or AI for the OT environment.”


New direction

According to the Cisco inaugural 2024 State of Industrial Networking Report, it does appear manufacturers are beginning to design and deploy their OT environments to improve security, increase efficiency, and provide a platform for innovation. The report mentioned that cybersecurity—the backbone of the digital movement—was the biggest reported challenge in running and maintaining industrial networks. Also adding to the problem are the requirements of Industry 4.0, a backlog of legacy systems and assets, an expanding attack surface and an overstretched workforce.

In the report, 89% of respondents said cybersecurity compliance is very important in their operational network. Also, the number one challenge when running industrial infrastructure is mitigating cyber threats.

With the management of enterprise and industrial networks increasingly overlapping, the report also found IT and OT teams need to become more collaborative. Executive leadership can see the benefits of a unified approach but, currently, the two functions remain siloed, impacting efficiency and threatening the overall security posture.

Recognizing that the industry does not adjust well to change, but knowing change is inevitable, collaboration is improving and new technologies are evolving to improve secuity. “Based on what I have observed, the influx of new technology in the cybersecurity industry is truly remarkable, especially with the explosion of artificial intelligence applications,” Chowdhury said. “I would not be surprised if roles like tier-one SOC [security operation center] analyst become completely automated by AI soon. It is nearly impossible for a human to efficiently sort through the tens of thousands or even hundreds of thousands of logs generated in a modern infrastructure. Additionally, I have noticed a rise in automated penetration testing tools that allow organizations to continuously test their security controls.”
 

Investing in AI, cloud

Chowdhury said the cybersecurity industry faces “a significant gap” between the number of available jobs and the qualified professionals needed to fill them. “Although schools are working hard to educate the next generation of cybersecurity experts, the lack of real-world scenario experience remains a significant challenge. This is why I see companies investing heavily in AI to bridge this gap and enhance their cybersecurity defenses.”

In more digitalized environments, cloud computing also is becoming a bigger element—something industry wags never thought would happen. “Strategic planning and adopting cloud solutions are essential in modern cybersecurity strategies,” Chowdhury said. “The cloud offers scalability and flexibility, which can enhance security measures. However, careful planning is necessary to integrate these technologies effectively, ensuring they complement existing security frameworks. By balancing foundational practices with innovative tools, organizations can build a resilient and adaptable defense against cyber threats coming from an expanded attack surface.”

As the threat landscape in the digital world constantly evolves, it is making it increasingly challenging for organizations.

With an expanded attack surface through increased connectivity, it can be a very daunting task to protect a network with all these connections. But with more demand to produce more and more product, understanding what production is doing and how to increase productivity is important.

Digital technology advances are continuing to move forward and the key to avoiding any kind of setback is a strong cybersecurity component acting as the backbone for a manufacturing enterprise.
 

People and process are key to digitalization

With 75 million baby boomers retiring from their manufacturing jobs in such a short time, the industry is facing a large demographic twist. It may seem like the industry will become more reliant on technology, but the tried-and-true cybersecurity triad of people, processes and technology will become even more pronounced in the coming years.

While some in the industry fear digital transformation will eliminate workers, others say people will become the most important asset. As technology innovation continues to grow and become smarter and more developed, it is also there to support and empower both people and processes. With that in mind, the following are some best practices to ensure a more secure digital environment:

  • Gain a strong grasp of basic cybersecurity fundamentals.

  • Communicate constantly.

  • Secure remote access.

  • Network segmentation.

  • Constantly back up data.

  • Implement a security framework.

  • Create a culture of collaboration with purpose-built OT and IT views to help address cybersecurity issues via different views and preferences.

  • Understand what is talking to what through continuous and real-time monitoring of asset and network connectivity with immediate alerts on any violation of security policies or anomalies.

  • Ensure visibility into ICS assets and networks, employing smart and advanced discovery techniques for complete asset inventory.

  • Visualize network topology and connectivity to provide a real-time view.

  • Predefine policies incorporating requirements in regulatory standards.

  • AI algorithms for auto-defining comprehensive security policies and proactively identifying a variety of threats and vulnerabilities.

  • This feature originally appeared in AUTOMATION 2024: 1st Annual OT Cybersecurity Trends Report.


  • ALSTOM MVAJM14JB1004A1 - N/O-4N/C 220-250VDC HIGH SPEED TRIPPING AND CONTROL RELAY
  • ALSTOM MC15-M2 - Gecostat excitation manual control excitation setting
  • ALSTOM RQ 1202 - POWER, ABB RAYMOND, MILLSIDE DEFLECTOR LINER, CROWN 700
  • CONVERTEAM D96-40005 - D9640005
  • CONVERTEAM 2123320 - 2123320
  • Alstom MVAX31S1DD0754A - GRID Alstom 10418907
  • ALSTOM 00305-501-00 - Detector rod plate new
  • Alstom 00305-696-00 - Lock Rod Plate NEW FREE SHIPPING
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • ALSTOM 00786-353-00 - Spring PT DET new
  • ALSTOM A62-0221 - Slow ACTING type B VITAL relay new with box
  • ALSTOM 101-314 - Combustion Engineering GE spring adjustment stud nut
  • CONVERTEAM MAE00-06 - MAE0006
  • Alstom 46553-004-00 - BUTN CONT F/LEVER CELL 1/2 NEW FREE SHIPPING
  • ALSTOM MVAAM11B1BA2530A - MVAAM auxiliary relay
  • ALSTOM MMLG01 - Test Block Module. Boxed
  • ALSTOM MVAAM11B1BA2530A - MVAAM AUXILIARY RELAY
  • ALSTOM MVAAM11B1BA2530A - MVAAM AUXILIARY RELAY
  • ALSTOM EPSC-0070 - Limelight coal flow monitoring kit
  • Alstom Microverter D 3.4/500 - 029.130 004 - New
  • CONVERTEAM GP12/15 - GP1215
  • GE IC693CPU364-EK - Alstom Cegelec Alspa 80-35 CPU 240K Mem & Ethernet Comms
  • CONVERTEAM GP12/37 - GP1237
  • ALSTOM C264MB1M691002320100000C000N10 - Micom C264 DS Agile Bay Controller
  • ALSTOM MVAJM14JB1004A1 - N/O-4N/C 220-250VDC HIGH SPEED TRIPPING AND CONTROL RELAY
  • CONVERTEAM MVAJ11D1GB0783A - MVAJ11D1GB0783A
  • DNTA 85/100C - ALSTOM soft starter free DHL
  • Alstom KMPC13001F12MEB - Measurement Centre Relay 5 57/120V 50/60Hz
  • CONVERTEAM GDS1003-4001 - GDS10034001
  • CONVERTEAM MP/F1700/G353 - MPF1700G353 (new no box)
  • ALSTOM MC15-M2 - Gecostat Excitation Manual Control Setting
  • ALSTOM 00305-500-00 - Detector rod plate new
  • ALSTOM N895600512D - Villeurbanne Card M 1000417012 Board 1040 ECPU1
  • ALSTOM D-984-0579 - GE FREQUENCY DETECTION BOARD TP305 A/W REV 02
  • ALSTOM 01601-162-00 - Washer 0.338 ID lock new
  • ALSTOM RP3-77-9786-PT1 - TIMKEN BEARING SPACER NEW (A541)
  • ALSTOM P139 - Micom Ptb 04 ATEX3044 P1393604544AW00E01
  • GE V7768-322000 - Energy / CONCURRENT / ALSTOM CPU board
  • ALSTOM MVC 3007-4002 - Screen Ribbon Cable Kit For Two Deltas *NEW*
  • ALSTOM A72DI-5-X-0 - Electrometer 0-300/1800 a
  • ALSTOM 45560-005-00 - Rod pin new
  • ALSTOM D42631P0001 - Locking Ring A513/A519
  • Alstom MFVUM 22D1AA0014A - Digital Frequency Relays Freq Rating 10.001 - 500 Hz
  • ALSTOM MAE 00-05 - I/O termination panel AVE250712
  • ALSTOM 029.144 470 - Generator-Interface 029.144471 FS10 BZB-3.10
  • ALSTOM EPSC-0070 - 100-240V 5A NSMP
  • ALSTOM N895605527E - Villeurbanne Card EHICOM_MOD_GS_2S.517 EHICOM 1000423532
  • ALSTOM 1G-4765 - Item 023116-CC1-1
  • ALSTOM 29545-015-00 - Operation Mech Trunnion new
  • Raymond RE648 - 703 bowl mill feed roll sheet "new" by Alstom Power
  • ALSTOM 5415 - Power assembly for GV7 fan, number:5415, with gray accessories, new
  • Alstom 5/16" 1BMBR0000090 - Power UNC 50 Gram Balance Weights
  • GEC KCC8302 - Alstom thyristor rectifier stack power module 20X-1310CRL 30Z-2116
  • ALSTOM P139 - Micom feeder management bracket control equipment Onebox NFP
  • Alstom MD2000 - Alspa Operating Unit
  • Alstom KCGG14201T50CEC - Single Phase Overcurrent AC Relay by Areva T&D UL Ltd
  • ALSTOM RP3-77-9783-PT1 - ARM GUIDE FAST SHIPPING (B168)
  • ALSTOM R303772P1 - Brown Boveri cover washer, 13335400
  • ALSTOM R303779P1 - 3/6 pinion gear 1-1/2 inch shaft 25 teeth gear
  • Alspa VF 2002 A - Alstom *H2R39E4*
  • Alstom 06714-271-00 - Bushing NEW FREE SHIPPING
  • ALSTOM MC15-M2 - Gecostat excitation manual control excitation setting
  • CONVERTEAM EPIC III E3-F-FN - EPICIIIE3FFN
  • GE FANUC/ALSTOM 316 - FIP CH S2 - IR129 -053034319 / 80801371 - G-64320003
  • GE IC693CMM311M - Alstom Cegelec Communications Control Module Alspa 80-35
  • CONVERTEAM MVS3000-4001 - ALSTOM ALSPA MV3000 driver data manager SKU#2
  • ALSTOM MT96-MPSU011 - MCMM003,MT93-HXC1XXX015,MCPU020 MDPCIOC002 Power supply
  • CONVERTEAM S98101/118 - S98101118 (new with box)
  • GE GP-2375-B - Alstom Combustion Engineering heavy hex jam nut
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC HIGH SPEED TRIPPING AND CONTROL RELAY
  • ALSTOM MVAAM11BJCJ5516A - PROTECTION RELAY
  • ALSTOM LGPG11101R551 - LGPG 111 EE DIGITAL INTRGRATED GENERATOR PROTECTION RELAY
  • CONVERTEAM 251459-000 - 251459000
  • ALSTOM D-996-326-PC25 - Threaded tube fitting C161-2991M25 4730009866528
  • GE FANUC/ALSTOM 317 - FIP CH S2 - IR129 -053034321 / 80801371 - G-64320001
  • ALSTOM D-984-0579 - GE FREQUENCY detection board TP305 A/W REV 02
  • ALSTOM 01054-000-0N - Throw rod bearing new
  • ALSTOM Microverter D 3.4/500 - 029.130 004 - NEW
  • Alstom MD2000 - Alspa Operating Unit
  • ALSTOM 4078B71H01 - Bombardier UMD-125-C contactor coil
  • ALSTOM MT96-MPSU011 - MCMM003,MT93-HXC1XXX015,MCPU020 MDPCIOC002 Power Supply
  • Alstom D-984-0579 TP305 - GE Frequency Detection Board A/W Rev 02
  • Alstom N895600512D - Villeurbanne Card M 1000417012 Board 1040 ECPU1
  • Alstom PS 421 - PS421 Control Unit
  • GE PIB504 - ALSTOM fiber optical interface board
  • Alstom VAA23ZG8507F(M) - Auxiliary Relay 110-250V AC/DC
  • Cegelec/Alstom GDS1017-4001 - Alstom Enhancement Card
  • Alstom 34232-084-01 - Sw Mach Oiler Fitting NEW FREE SHIPPING
  • ALSTOM MVAJM15JA1002A - HIGH SPEED TRIPPING AND CONTROL RELAY
  • ALSTOM 00441-005-0N - Screws 4PK NEW
  • ALSTOM MT96-MPSU011 - MCMM003,MT93-HXC1XXX015,MCPU020 MDPCIOC002 Power Supply
  • ALSTOM FS-100-331 - Limelight flame spectrometer 110-220 VAC 50-60 Hz (new with box)
  • GE 101-295 - Alstom Combustion Engineering stud adjuster jam nut NOS
  • CONVERTEAM 20X4498/110C - 20X4498110C
  • ALSTOM D-984-0584 2/4 - FLAME & FAULT ALARM BOARD
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • ALSTOM MVAJ105JA1002A - TRIPPING CONTROL RELAY
  • Alstom 54549-000-02 - Sw Mach Gear Complete NEW FREE SHIPPING
  • Alstom 30v9200/110 - Alspa gd3000e Reader Course Board With gds1003-4001 Keypad
  • ALSTOM R461 - POWER PAWL LIFTING LEVEL (1 PIECE) NEW R-461 132214
  • Alstom 029.069 615 - PCB Card
  • Alstom 20x4496 - Power Conversion PCB Card Rev 0004
  • ALSTOM VTT11ZG8050LCH - VTT DEFINITE TIME RELAY 110-125V AC
  • GEC KCC8302 - Alstom thyristor rectifier stack power module 20X-1310CRL 30Z-2116
  • ALSTOM 94-165 - GE Combustion Engineering hinge shaft NOS
  • ALSTOM FV223-M2 - GECOSTAT EXCITER DIODE FAILURE DETECTOR
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • Alstom 34232-064-02 - Drive .188 Oiler Fitting NEW FREE SHIPPING
  • ALSTOM N895604516F - Villeurbanne Card ECPU2_2_2GS SOS.512B Board ECPU2 1000268972
  • CONVERTEAM MVDL800-4701 - MVDL8004701
  • ALSTOM SCN 804D - Measurement interface module
  • ALSTOM RP3-77-9783 - Arm guide for Alstom grid SPO expender (B278)
  • Alstom HTGD333336P0049 - Brown Boveri 4.5" Inch Key Segment
  • Alstom M870D - Bitronics Remote Display Unit 3773
  • ALSTOM D-984-0579 - GE FREQUENCY DETECTION BOARD TP305 A/W REV 02
  • Alstom M870D - Bitronics Remote Display Unit 19490 4053
  • Alstom P701000011S - TFM GW-FE Module M 1000742179
  • ALSTOM A96LC - TYPE A96LC
  • ALSTOM S20-0007-02 - Power Hub accessory * new *
  • ALSTOM RS422 - Module * NEW NO BOX *
  • GE PIB315B - ALSTOM PCB board
  • ALSTOM PRS12N04BH - PRIMA relay
  • ALSTOM MVAJ105JA1002A - TRIPPING CONTROL RELAY
  • ALSTOM MVAJ105JA1002A - TRIPPING CONTROL RELAY
  • NASG 7115 - Holdings Green-Amber Light Panel Assembly for Alstom Cabs
  • ALSTOM P241911B2M0600J - Modular Protection Platform
  • ALSTOM MCHNM01H1AB0500A - MOTPRO MCHNM protection relay