
{"id":852,"date":"2017-08-02T10:48:56","date_gmt":"2017-08-02T06:48:56","guid":{"rendered":"http:\/\/blog.phoenixcontact.com\/marketing-ae\/?p=852"},"modified":"2017-08-02T11:06:05","modified_gmt":"2017-08-02T07:06:05","slug":"industrial-network-security-cyber-security","status":"publish","type":"post","link":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/","title":{"rendered":"Secure Industrial Networks [Cyber Security]"},"content":{"rendered":"<p><em>Written by Amandeep Yashpal, Product Specialist &#8211; Cyber Security &amp; Networks &#8211; UAE<br \/>\n<\/em><\/p>\n<h2>Cyber security is a vital part of the process and infrastructure industry operations<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg\" width=\"220\" height=\"165\" \/><\/p>\n<p>Nowadays, Cyber security is a vital part of the process and infrastructure industry operations. Industrial cyber security refers to the protection of internal components and systems from internal and external malicious attacks to maintain the Availability, Integrity, and Confidentiality. It protects the industries against loss or damage.<\/p>\n<p>Most of the network devices used in the industrial network are designed to meet functional requirement, safety, reliability and real time response. They were physically isolated from the outside networks. Most of the time only proprietary protocol and solutions are used for the industry network. At a later stage, TCP\/IP protocol is introduced to industry networks which connect the industrial network to an external network. The introduction of TCP\/IP to industrial networks, create new possibilities for better connectivity and also provide rich opportunities to adversaries to exploit the vulnerabilities.<\/p>\n<p>The root cause of this intense new risk relates to the complexity of ICS legacy system that was never originally designed to stop cyber-attacks. Legacy water pump installed over the plant 15 years back, were obviously not designed to address modern cyber security attacks.\u00a0\u00a0Complex legacy technology and high attack consequences lead to a high cyber security risk for most industrial networks.\u00a0It could be any reason for such incidents to happen. Likewise<\/p>\n<ul>\n<li>Lack of redundancy in the network.<\/li>\n<li>No segmentation of network.<\/li>\n<li>No security perimeter is defined.<\/li>\n<li>Firewall is not incorporated in the network architecture.<\/li>\n<li>No deep inspection of packets moving from field device to field device or control server.<\/li>\n<li>Insecure remote connections.<\/li>\n<li>Lack of compatibility of security architectural components with legacy protocols and system.<\/li>\n<li>No mechanism to identify the changes in configuration of field device and files.<\/li>\n<\/ul>\n<p>The biggest challenge in the ICS and SCADA security protection is that the infrastructure used in ICS &amp; SCADA is having significant legacy technology. This includes older protocol and proprietary control components.<!--more--><\/p>\n<h2>How to protect SCADA &amp; ICS system<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_stage_sub\/pic_stage_sub_a_0075615_int.jpg\" alt=\"Cyber Security - Phoenix Contact\" width=\"676\" height=\"260\" \/><\/p>\n<p>To protect the SCADA and ICS, we need to introduce the security architectural components to industrial system networks. This includes firewalls, VPN, and router and so on.\u00a0Secondly, we need the security products that can understand the industrial functions and behave accordingly. Few companies are doing their best to make fit their product for industrial network likewise Phoenix contact.<\/p>\n<p>Phoenix contact offers a range of products for industrial networks and cyber security that are exclusively designed to work in environmental rigidness.<\/p>\n<p>mGuard product range is a comprehensive solution for industrial security that will strengthen the industrial cyber security posture without introducing any complexity in the network.<\/p>\n<p>With its mGuard product line of network security appliances, PHOENIX CONTACT is offering router, firewall, VPN, QoS, and intrusion detection, OPC\/Modbus inspection, integrity monitoring, and more supporting functionalities, complemented with highly scalable device management software. Devices, which are both easy to install and service, can be integrated either in production systems or connected upstream to existing systems in continuous operation.<\/p>\n<p>To know in details how mGuard product range will secure the industrial network security and helpful in compliance with industrial cyber security framework, route your queries to ayashpal@phoenixcontact.com<\/p>\n<p>For more details please visit the following link <a href=\"https:\/\/www.phoenixcontact.com\/online\/portal\/ae?1dmy&amp;urile=wcm%3apath%3a\/aeen\/web\/main\/products\/subcategory_pages\/Cyber_security_P-08-10-08\/3bd0489c-fcd0-4c5f-84e6-8d02e094bbcb\" target=\"_blank\" rel=\"noopener\">Phoenix contact mGuard product range<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by Amandeep Yashpal, Product Specialist &#8211; Cyber Security &amp; Networks &#8211; UAE Cyber security is a vital part of the process and infrastructure industry operations Nowadays, Cyber security is a vital part of the process and infrastructure industry operations. Industrial cyber security refers to the protection of internal components and systems from internal and [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[240,236,241,237,238,239],"class_list":["post-852","post","type-post","status-publish","format-standard","hentry","category-industrial-electronics","tag-defence-in-depth","tag-firewall","tag-industrial-safety","tag-mguard","tag-security","tag-virus-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security<\/title>\n<meta name=\"description\" content=\"With industrial firewalls, Phoenix Contact offers cyber security infrastructure for safeguarding industrial systems against cyber attacks and viruses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security\" \/>\n<meta property=\"og:description\" content=\"With industrial firewalls, Phoenix Contact offers cyber security infrastructure for safeguarding industrial systems against cyber attacks and viruses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Middle East\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-02T06:48:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-02T07:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg\" \/>\n<meta name=\"author\" content=\"Dania Liswi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dania Liswi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/\",\"name\":\"Cyber Security\",\"isPartOf\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg\",\"datePublished\":\"2017-08-02T06:48:56+00:00\",\"dateModified\":\"2017-08-02T07:06:05+00:00\",\"author\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/65c3d3a8636baa53136cfd46c7a2a982\"},\"description\":\"With industrial firewalls, Phoenix Contact offers cyber security infrastructure for safeguarding industrial systems against cyber attacks and viruses.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#primaryimage\",\"url\":\"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg\",\"contentUrl\":\"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Industrial Networks [Cyber Security]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/\",\"name\":\"Middle East\",\"description\":\"PHOENIX CONTACT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/65c3d3a8636baa53136cfd46c7a2a982\",\"name\":\"Dania Liswi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2018\/04\/Dania-Liswi_avatar_1523778085-96x96.jpg\",\"contentUrl\":\"http:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2018\/04\/Dania-Liswi_avatar_1523778085-96x96.jpg\",\"caption\":\"Dania Liswi\"},\"sameAs\":[\"https:\/\/www.phoenixcontact.com\/online\/portal\/ae\"],\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/author\/aeld01\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security","description":"With industrial firewalls, Phoenix Contact offers cyber security infrastructure for safeguarding industrial systems against cyber attacks and viruses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security","og_description":"With industrial firewalls, Phoenix Contact offers cyber security infrastructure for safeguarding industrial systems against cyber attacks and viruses.","og_url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/","og_site_name":"Middle East","article_published_time":"2017-08-02T06:48:56+00:00","article_modified_time":"2017-08-02T07:06:05+00:00","og_image":[{"url":"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg","type":"","width":"","height":""}],"author":"Dania Liswi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dania Liswi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/","name":"Cyber Security","isPartOf":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg","datePublished":"2017-08-02T06:48:56+00:00","dateModified":"2017-08-02T07:06:05+00:00","author":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/65c3d3a8636baa53136cfd46c7a2a982"},"description":"With industrial firewalls, Phoenix Contact offers cyber security infrastructure for safeguarding industrial systems against cyber attacks and viruses.","breadcrumb":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#primaryimage","url":"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg","contentUrl":"https:\/\/www.phoenixcontact.com\/assets\/images_ed\/global\/web_content_1col\/pic_con1_a_0043686_int.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/industrial-network-security-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/"},{"@type":"ListItem","position":2,"name":"Secure Industrial Networks [Cyber Security]"}]},{"@type":"WebSite","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/","name":"Middle East","description":"PHOENIX CONTACT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/65c3d3a8636baa53136cfd46c7a2a982","name":"Dania Liswi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/image\/","url":"http:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2018\/04\/Dania-Liswi_avatar_1523778085-96x96.jpg","contentUrl":"http:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2018\/04\/Dania-Liswi_avatar_1523778085-96x96.jpg","caption":"Dania Liswi"},"sameAs":["https:\/\/www.phoenixcontact.com\/online\/portal\/ae"],"url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/author\/aeld01\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/comments?post=852"}],"version-history":[{"count":4,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/852\/revisions"}],"predecessor-version":[{"id":856,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/852\/revisions\/856"}],"wp:attachment":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/media?parent=852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/categories?post=852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/tags?post=852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}