The global industrial community is wary of cybersecurity threats Honeywell has dealt with it

The topic of cybersecurity was originally confined to the field of IT. With the rapid development of automation and the rapid development of the Internet of Things, this topic has become a hot topic in automation industry recently. At the 2013 Honeywell Asia-Pacific User Conference The same is true. Interestingly, although all participating users are very concerned about this, but many of the world famous process group of industrial experts have stated their own level of awareness of network security is quite junior. In response, Honeywell gave its own positive view as a total solution provider. First of all, Tony Cosgrove, vice president of Asia Pacific Process Control at Honeywell, gave a shocking figure. To date, 40 to 60 billion U.S. dollars in losses worldwide have come from cyber attacks on industrial control systems.

For this data, Michael Baldi, Honeywell's Core Network Security Specialist, Global Infrastructure Team Honeywell Process Process Controls, and Honeywell Process Control Lifecycle and Service Solutions, Mike Spear, Worldwide Operations Manager of Information Solutions, told the company in an interview that the real loss is likely to be larger than this figure, as control system customers are often reluctant to take the initiative to report a cyberattack because companies face such incidents, In addition to suffering a great deal of actual losses, they also have many adverse effects. Therefore, they tried hard to hide and implicitly seek solutions. (In addition, according to a report issued by information security provider Macfee, the global industry lost as much as 5 trillion U.S. dollars due to cyberattacks, but did not indicate what kind of industry losses.) In addition, Mr. Baldi pointed out that China and the rest of the world The level of cyber threat is not much different, and the real challenges are global in nature. Once networked, any object that uses the control system poses a potential cybersecurity risk. The promotion of open network technology makes network protection more vulnerable.

Where does the threat come from?

Global cyber attacks are universal. People are mostly aware of cyber-attack industrial networks based on the famous Epicenter virus, but in fact the attacks can come from the outside as well as from the inside. According to Mr. Baldi, employees plugged a virus-infected USB flash drive into an enterprise's process control system network device, a high-probability event that the system was attacked. On the other hand, there are always people on the Internet with various purposes and various mindsets constantly trying to invade the Internet. Therefore, the mode of protection should be global in nature. However, adding remote monitoring with internet platforms will inevitably increase the risk of cybersecurity, which is a false proposition. If there is a sound safety certification mechanism, remote monitoring should have a positive meaning to quickly respond to on-site safety emergencies and eliminate the order for recovery from failures.

Mr. Spear added: Remote connectivity is only part of cybersecurity and there are many ways in which the remote monitoring architecture can control ENG. One of the most secure ways to choose is. Customers also need to address issues such as reducing downtime, employee skill training, and more. Network security is indeed a challenge. There is not 100% security on the network unless unplugged.

Industrial Network Security Standard

Mr. Michael Baldi said: ISASecure, the international safety standard, is aiming at the network security specification in the field of industrial control systems. It is jointly launched by business owners, carriers and suppliers such as Honeywell. The government also hired United Nations experts in thematic matters and experts in the field of security to advise on safety standards for industrial control systems. Its predecessor is ANSI / ISA99 (IEC 62443) safety standards.

Honeywell has received ISASecure certification for compliance with safety standards with ISA Secure certified supplier systems. This certification by the certification laboratory certification process is very comprehensive, from three aspects, namely, product, security design and product response to the attack test security features to ensure that certified products, systems in network attack testing standards, at the same time Evaluate the entire security development process and product development approach. For example, developers must be trained in safety and all products must be safety tested and must meet all of the criteria for certification. For end users, ISASecure certification tells the user what level of security they are buying. Users can also come from Honeywell or other network security consulting team to assess, to help users plan properly, the implementation of malicious software system recovery, to achieve a reasonable setting of security practices. To ensure that the site safe operation of the rationality,

According to Mr. Baldi, the U.S. government is trying to strengthen the protection of resources in key infrastructure areas and implement the proposed safety standards in these areas. Of course, this is still in its infancy, only a plan. If the critical infrastructure, communications, power or energy site safety standards can be met, the United States government can basically control the risk. The White House recently introduced a bill on cybersecurity that the U.S. government plans to invest heavily in cybersecurity. President Obama signed Order No. 2, which states that we must protect our critical infrastructure because he is aware that national cybersecurity can be a serious threat to a country and can even cause more damage.

Can Honeywell provide consulting services to Chinese industrial enterprises in the area of ​​network security? Yes, Honeywell's answer is clear. Spear said: "We provide this service every day in the world. We will evaluate and control the engineering network, and then provide relevant advice and solutions for the enterprise. We will provide additional security services for special security needs. This is the responsibility of the cybersecurity service team. "Mike Baldi believes that experts in solving cyber-security issues in industrial control must have both IT and industrial knowledge. Mr. MikeSpear added: "As far as I know, it is not uncommon to find a core elite team of people who possess both IT network security experience and industrial control knowledge, as well as global layout and localization support "

Honeywell also previewed the latest cybersecurity product at its Asia Pacific user conference: Cyber ​​Security Dashboard. It simplifies the task of keeping the automation system up to date with the latest network security requirements. The dashboard integrates all the data on a single page, providing better visibility and giving users more easy access to details such as graphics, trends, files, or related applications. Its advanced data analysis capabilities allow operators to customize their own alarm functions such as updating anti-virus protection software, managing update packages and other on-line tasks related to network security. This product is expected to be launched worldwide in 2014.

Essential Oil Box

Benefits For Your Essential Oil Box Boxes


Order our Essential Oil Box boxes at wholesale rates when placing an order in bulk.
Customization coming in any size to fit different ends.
Made of heavyweight chipboard to build strong construction for any end.
Print any color of custom logo and full color photographic custom design.
Print finishes like hot stamping, embossing, deboss are available to print.

Essential Oil Box,Luxury Round Paper Tube,Essential Oil Box Packaging,Essential Oil Tube Canister Box

UCPACK , https://www.packpioneers.com