www.cechina.cn
, and their visibility seems to increase almost on a daily basis. New IT and industrial Control system platforms are incorporating vastly improved security functions, but the problem for industry is that huge numbers of control systems predate these cyber security efforts, and many even predate large-scale deployment of Control Engineering July 2009 Coverthe Internet. Connections to those systems from the outside provide the“Traditionally
www.cechina.cn
, a control system was purchasedCONTROL ENGINEERING China版权所有
, engineered, configured, implementedwww.cechina.cn, and pretty much forgotten about for the next 20 or so yearswww.cechina.cn
,” says Ernie Rakaczky控制工程网版权所有, principal security architect for Invensys Process Systems. “In many ways that’s still the mindset of the control community, but a lot has happened in the last five or 10 years. Many of those early systems had no capability to be connected to anything else. They were designed to do one thing in life: they open and close a valve or they measure a levelCONTROL ENGINEERING China版权所有, so the cyber world really doesn’t play a role.”The problem iswww.cechina.cn, the world didn’t stay that way. With the growth of information technology in general, the desire to extract information and to provide connectivity to outside users grew too. Rakaczky adds, “At one point控制工程网版权所有, a traditional control system was 100% focused on controlling a process. Now it’s probably 50% control and 50% information exchange. When that started to happen, and we started to move data off the control platform to a historian or plant network or enterprise networkwww.cechina.cn, it was time to start adding some best practices, being more cautious, and putting some functionality in to protect yourselves.”
www.cechina.cn


在线会议
论坛
专题
工控直播
新闻中心
子站
技术
社区


2026具身智能机器人电子制造应用研讨会
福禄克六大“法宝”帮您搞定过程仪表校准难题
中控时间序列大模型TPT免费有奖体验
爱德克SE2L进阶版安全激光扫描仪有奖预约演示
剑维软件电子半导体行业白皮书有奖下载





















