www.cechina.cn
, and their visibility seems to increase almost on a daily basis. New IT and industrial Control system platforms are incorporating vastly improved security functions, but the problem for industry is that huge numbers of control systems predate these cyber security efforts, and many even predate large-scale deployment of Control Engineering July 2009 Coverthe Internet. Connections to those systems from the outside provide the“Traditionally
www.cechina.cn
, a control system was purchasedCONTROL ENGINEERING China版权所有
, engineeredCONTROL ENGINEERING China版权所有, configured, implementedwww.cechina.cn, and pretty much forgotten about for the next 20 or so yearswww.cechina.cn
,” says Ernie Rakaczky, principal security architect for Invensys Process Systems. “In many ways that’s still the mindset of the control community控制工程网版权所有, but a lot has happened in the last five or 10 years. Many of those early systems had no capability to be connected to anything else. They were designed to do one thing in life: they open and close a valve or they measure a levelCONTROL ENGINEERING China版权所有, so the cyber world really doesn’t play a role.”The problem iswww.cechina.cn, the world didn’t stay that way. With the growth of information technology in general, the desire to extract information and to provide connectivity to outside users grew too. Rakaczky adds, “At one point, a traditional control system was 100% focused on controlling a process. Now it’s probably 50% control and 50% information exchange. When that started to happen, and we started to move data off the control platform to a historian or plant network or enterprise networkCONTROL ENGINEERING China版权所有, it was time to start adding some best practices, being more cautious, and putting some functionality in to protect yourselves.”
www.cechina.cn


在线会议
论坛
专题
工控直播
新闻中心
子站
技术
社区


爱德克SE2L进阶版安全激光扫描仪有奖预约演示
剑维软件电子半导体行业白皮书有奖下载
魏德米勒麒麟系列产品赋能本土工业
Fluke 283 FC 智能万用表震撼来袭
SugonRI2.0工业编程平台免费有奖试用





















