Byresâ experience reveals the problem is not one of âterrorists and kiddy hackers. This is a problem about organized crime and the safety of your systems,â he declares.
To combat those cyber-criminals, Byres suggests a multi-step process, beginning with problem identification. âToo many senior management donât see this as a real issue,â he asserts. âThe crown jewels of any company are its manufacturing assets. But people donât give resources to the most important things in the company.â
Know the system
That failure derives from managementâs lack of knowledge, he says, especially not understanding resources such as programmable logic controllers (PLCs) or, generally, controls systems. For instance, go into a companyâs offices and check the receptionistâs desktop personal computer (PC), Byres suggests. âYou will find it has anti-virus software, patch management, an encryption system and a firewall. The IT department will have that thing nailed to the floor.â
But walk out of the lobby into the manufacturing space and youâll find something totally different, Byres predicts. âThereâs a PLC running a major piece of equipmentâand I guarantee youâll find very little security protection,â he notes. Some of the better plants, such as those operated by major oil companies, will provide the same level of protection for plant-floor PCs as they do for the receptionistâs PC, Byres allows. But what he sees in many plants are PCs with no security on them, not to mention PLCs that are totally unprotected.
So how does the control system get exposed to attackers? One example he gives is having the control network connected to the business network, which then is exposed to the Internet. âOr someone working at home, doing [remote] maintenance via their home computer, like a VPN (virtual private network), and their machine is exposed to the network.â
What drives better security is manufacturing taking responsibility for itself, he thinks. But âwithout senior management support, youâre sunk.â With that support, though, whatâs next? âForm a team with IT.â Next? âKnow what equipment you haveâand its vulnerability and risk,â recommends Byres, who defines vulnerability as weakness or flaws in system that cause risk, which he also defines as the probability a certain event with a certain consequence will occur.
Then lay out security targets. âWhat do you want to achieve?â While Byres believes 100 percent security is unachievable, he urges formulating whatâs acceptable. Calling this network-security process âexactly the same as safety management,â he observes that, âif you canât tell me whatâs running on your control network, then thereâs no way you can assure me youâve got a safe, reliable plant.â
After setting targets, establish policies and technologies. âYou have to change peopleâs behavior,â Byres remarks. Then comes implementation. And that demands that companies have to change security to make it work for people, not the other way around. âWe have to change technology to make it understandable and accessible to the control engineers and technicians,â Byres says.
The last action is to close the control loop and monitor whatâs been built, and then put that feedback into a continuous improvement loop. Why? âHackers and virus writers are certainly continuously improving their product,â Byres observes, so manufacturers had better do the same.
C. Kenna Amos, [email protected], is an Automation World Contributing Editor.
About the Author
C. Kenna Amos
Contributing Editor

Leaders relevant to this article:
