{"id":9101,"date":"2016-04-28T14:44:36","date_gmt":"2016-04-28T06:44:36","guid":{"rendered":"http:\/\/blog.phoenixcontact.com\/marketing-sea\/?p=9101"},"modified":"2019-10-07T20:14:58","modified_gmt":"2019-10-07T12:14:58","slug":"cybersecurity-for-industrial-processes","status":"publish","type":"post","link":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/","title":{"rendered":"Cybersecurity for Industrial Processes"},"content":{"rendered":"<p style=\"text-align: center\"><strong><a href=\"http:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9103 alignleft\" src=\"http:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg\" alt=\"a_0043686_int\" width=\"800\" height=\"600\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg 800w, https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int-300x225.jpg 300w, https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int-600x450.jpg 600w, https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int-624x468.jpg 624w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/strong><\/p>\n<p><strong><u>Cybersecurity for Industrial Processes<\/u><\/strong><\/p>\n<p>Cybersecurity has become an increasingly prevalent subject in the last decades. While the focus has been largely on IT infrastructure and online safety, more attention has now been placed on Cybersecurity for industrial processes such as factory automation, water\/wastewater plants, power generation and power T&amp;D. This can be attributed to the increased awareness that cybersecurity required for IT is very different from cybersecurity efforts needed for industrial processes.<\/p>\n<p>The main difference is the priority for these two information infrastructure. In IT, it is possible to focus heavily on cybersecurity, such that emails, applications, documents can be blocked with minimal impact on a companies\u2019 P&amp;L. On the other hand, downtime can result if files are stopped from being passed from one device to the other for Industrial processes. Downtime for Industrial processes is very costly as one can observe below.<\/p>\n<p><a href=\"http:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/downtime-by-industry.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-9105 \" src=\"http:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/downtime-by-industry.png\" alt=\"downtime by industry\" width=\"286\" height=\"211\" \/><\/a><br \/>\nThe are explicit costs due to downtime. In the case of concerted attack on Nuclear Power Plans (stuxnet incident)\u00a0 or Power T&amp;D systems (recent Ukraine cyberattack, causing mass blackout affecting at least 200,000 citizens), prolong system downtime can lead to life being lost, severe inconveniences amongst other non-monetary, immeasurable outcomes.<\/p>\n<p>With such different requirements, it is then common sense that plant owners should look beyond IT cybersecurity devices for protection of industrial processes. While firewalls, VPNs, VLans, subnet etc. works for both IT and Industrial processes; IDS\/IPS (Intrusion detection system\/Intrusion protection system) is not ideal for Industrial processes because they are actively monitoring the data passing through. This not only slows down data transfer and cause delays (again, not damaging in IT network) but often results in false alarms: There can be unusual data passing through which might not be malicious but are essential to operations. IPS\/IDS will stop these data and can potentially lead to down time.<\/p>\n<p>In particular, IPS\/IDS are used to protect against zero-day attacks\/advanced persistent threats where an external party remains in contact with malicious code after they infiltrate systems. These external parties then manipulate these codes further to target specific loopholes. As such, anti-virus cannot detect these codes (no known signature) and firewalls\/VPNs are bypassed.<\/p>\n<p>At Phoenix Contact, we recommend MGuard with CIFS Integrity Monitoring that is tailored for Industrial Processes Protection against Zero-day attacks and advanced persistent threats:<\/p>\n<p><iframe loading=\"lazy\" title=\"FL mGuard - Five-minute overview - Phoenix Contact\" width=\"625\" height=\"352\" src=\"https:\/\/www.youtube.com\/embed\/wmiRI_5W2rY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Discover Malware on Day Zero: Integrity Monitoring<\/p>\n<p>Due to the general problems with the deployment of antivirus software on industrial PCs and the timely provision of malware signatures, alternative techniques of integrity assurance are gaining relevance for the protection of industrial systems.<br \/>\nOne solution is the CIFS Integrity Monitoring feature offered on Phoenix Contact&#8217;s FL mGuard security devices. CIFS, or Common Internet File System, is a file-sharing protocol used by Windows and other operating systems. Viewing files on network file servers and using shared network drives are common activities that utilize CIFS. With Integrity Monitoring, the user can monitor configurable sets of files for unexpected modifications of executable code. When initialized, Integrity Monitoring computes a baseline of signatures for all monitored objects and then periodically checks them for any deviations. This process works without any external supply of virus signatures, without the risk of disrupting operations through \u201cfalse positives,\u201d without installation of software, and with only a moderate load on the monitored PCs, while primarily utilizing the resources of an mGuard security appliance. The mGuard thus discovers suspect file modifications promptly, and reports them via SNMP and e-mail to network<br \/>\nmanagement systems or responsible administrators.<\/p>\n<p>In a test study performed at the University of Ostwestfalen-Lippe in Lemgo, Germany, researchers from the independent inIT institute for industrial IT (<a href=\"http:\/\/www.hs-owl.de\/init\/en\/\">www.hs-owl.de\/init\/en\/<\/a>) have been able to verify that mGuard CIFS Integrity Monitoring would have recognized infections with Stuxnet on day zero as unexpected manipulations and warned asset operators against it long before any antivirus product. The device drivers installed by Stuxnet, as well as the modifications performed by the worm on the pivotal SIMATIC Manager DLL,<br \/>\nwould have been discovered in the process.<\/p>\n<p>Some other features that makes mGuard ideal:<\/p>\n<ul>\n<li>Stealth mode \u2013 fast retrofitting without the need to configure\/reconfigure IP addresses<\/li>\n<li>OPC Inspectors \u2013 ability to track random ports opened by OPC Classic, which render firewall useless<\/li>\n<li>3G remote access\n<ol>\n<li>If there are deviations detected with CIFS integrity monitoring, SMS alarm can be sent to system engineers.<\/li>\n<li>Although regular CIFS scan can be scheduled, in the event of known cyberattacks, engineers can simply SMS into mGuard to start an adhoc scan<\/li>\n<li>With 3G, mGuard or devices connected to mGuard can be remotely accessed from anywhere around the world<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<p>To find out more about how mGuard can help to secure your industrial systems:<\/p>\n<p>Click <a href=\"http:\/\/blog.phoenixcontact.com\/marketing-sea\/?p=9109\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> to download a white paper on Post-stuxnet Industrial Security<\/p>\n<p>or contact us at marketing@phoenixcontact.com.sg for a demo on MGuard configuration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity for Industrial Processes Cybersecurity has become an increasingly prevalent subject in the last decades. While the focus has been largely on IT infrastructure and online safety, more attention has now been placed on Cybersecurity for industrial processes such as factory automation, water\/wastewater plants, power generation and power T&amp;D. This can be attributed to the [&hellip;]<\/p>\n","protected":false},"author":107,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,17,904,906,1],"tags":[917,916,918],"class_list":["post-9101","post","type-post","status-publish","format-standard","hentry","category-io-and-networks","category-ie","category-industries","category-power","category-uncategorized","tag-cybersecurity","tag-iec-61850","tag-industrial-process"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity for Industrial Processes | Southeast Asia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for Industrial Processes | Southeast Asia\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity for Industrial Processes Cybersecurity has become an increasingly prevalent subject in the last decades. While the focus has been largely on IT infrastructure and online safety, more attention has now been placed on Cybersecurity for industrial processes such as factory automation, water\/wastewater plants, power generation and power T&amp;D. This can be attributed to the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/\" \/>\n<meta property=\"og:site_name\" content=\"Southeast Asia\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/phoenixcontactsea\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-28T06:44:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-07T12:14:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg\" \/>\n<meta name=\"author\" content=\"jasonsoh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Phoenix_Contact\" \/>\n<meta name=\"twitter:site\" content=\"@Phoenix_Contact\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jasonsoh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/\",\"name\":\"Cybersecurity for Industrial Processes | Southeast Asia\",\"isPartOf\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg\",\"datePublished\":\"2016-04-28T06:44:36+00:00\",\"dateModified\":\"2019-10-07T12:14:58+00:00\",\"author\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#\/schema\/person\/f01434610f1771b42e5833243e11f496\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#primaryimage\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg\",\"contentUrl\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity for Industrial Processes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#website\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/\",\"name\":\"Southeast Asia\",\"description\":\"PHOENIX CONTACT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#\/schema\/person\/f01434610f1771b42e5833243e11f496\",\"name\":\"jasonsoh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51d1544d5bec20ddba223f31d7a48c38dace8efa1613c5d57385e9390659a9f3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51d1544d5bec20ddba223f31d7a48c38dace8efa1613c5d57385e9390659a9f3?s=96&d=mm&r=g\",\"caption\":\"jasonsoh\"},\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-sea\/author\/jasonsoh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for Industrial Processes | Southeast Asia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity for Industrial Processes | Southeast Asia","og_description":"Cybersecurity for Industrial Processes Cybersecurity has become an increasingly prevalent subject in the last decades. While the focus has been largely on IT infrastructure and online safety, more attention has now been placed on Cybersecurity for industrial processes such as factory automation, water\/wastewater plants, power generation and power T&amp;D. This can be attributed to the [&hellip;]","og_url":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/","og_site_name":"Southeast Asia","article_publisher":"http:\/\/www.facebook.com\/phoenixcontactsea\/","article_published_time":"2016-04-28T06:44:36+00:00","article_modified_time":"2019-10-07T12:14:58+00:00","og_image":[{"url":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg","type":"","width":"","height":""}],"author":"jasonsoh","twitter_card":"summary_large_image","twitter_creator":"@Phoenix_Contact","twitter_site":"@Phoenix_Contact","twitter_misc":{"Written by":"jasonsoh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/","url":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/","name":"Cybersecurity for Industrial Processes | Southeast Asia","isPartOf":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#primaryimage"},"image":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#primaryimage"},"thumbnailUrl":"http:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg","datePublished":"2016-04-28T06:44:36+00:00","dateModified":"2019-10-07T12:14:58+00:00","author":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#\/schema\/person\/f01434610f1771b42e5833243e11f496"},"breadcrumb":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#primaryimage","url":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg","contentUrl":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-content\/uploads\/sites\/14\/2016\/04\/a_0043686_int.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/2016\/04\/cybersecurity-for-industrial-processes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity for Industrial Processes"}]},{"@type":"WebSite","@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#website","url":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/","name":"Southeast Asia","description":"PHOENIX CONTACT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#\/schema\/person\/f01434610f1771b42e5833243e11f496","name":"jasonsoh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51d1544d5bec20ddba223f31d7a48c38dace8efa1613c5d57385e9390659a9f3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51d1544d5bec20ddba223f31d7a48c38dace8efa1613c5d57385e9390659a9f3?s=96&d=mm&r=g","caption":"jasonsoh"},"url":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/author\/jasonsoh\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/posts\/9101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/users\/107"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/comments?post=9101"}],"version-history":[{"count":5,"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/posts\/9101\/revisions"}],"predecessor-version":[{"id":15197,"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/posts\/9101\/revisions\/15197"}],"wp:attachment":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/media?parent=9101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/categories?post=9101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-sea\/wp-json\/wp\/v2\/tags?post=9101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}