search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Page 10


www.us- tech.com


TechWaTch


OT Security in Electronics Manufacturing: Current Threat Landscape and What Can Be Done


By Yoni Shohet, Co-founder and Vice President of Business Development, SCADAfence E


lectronics manufacturers by nature are leaders in innova- tion and have rapidly adopted


digitalized industrial operations, which enables them to keep up with the ever-increasing demand for smart devices, such as TVs, smart- phones, and the Internet of Things (IoT). Digitizing industrial opera- tions allows manufacturers to maxi- mize production capacity, efficiency, flexibility, and adaptivity to stay competitive in the market and re- spond to dynamic, growing market demand. Therefore, electronics manufac-


turers are at the forefront of adopt- ing advanced production technolo- gies, and, over the past few years, have been rapidly implementing In- dustrial IoT (IIoT) technologies. Adoption of IIoT technologies digital- izes industrial operations and signif- icantly increases automation on shop floors, which allows manufacturers


to improve their response time to de- mand and focus on innovation. To truly enjoy the benefits of


the IIoT, information technology (IT) and operational technology (OT) are converging, and connectivity be- tween IT, OT and the internet has become an industry standard. Along- side the many benefits of advanced IIoT technologies and connectivity, OT networks are increasingly ex- posed to the risk of cyberattacks, which have the potential to manipu- late or even shut down industrial control systems (ICS).


Prime Targets for Cyberattacks Manufacturing industry shop


floors have become prime targets for cyberattacks. Many organizations have been reporting significant fi- nancial damage estimated in the hundreds of millions of dollars, due to production downtime following cy- bercrime.


One of the recent examples of


cyberattacks against OT networks is Taiwanese manufacturer TMSC. The iPhone chip supplier reported that during August 2018 its production lines were hit by a ransomware at- tack that halted production in sever-


The WannaCry ransomware attack on


TSMC in August 2018 cost the company more than $250 million.


al facilities. The attack cost TSMC 3 percent of its quarterly revenue, esti- mated at more than $250 million. The WannaCry ransomware was


introduced into TSMC’s OT network through newly connected equipment that was not properly secured. Lever- aging the many vulnerabilities in these networks, such as legacy un- patched systems, and the increased in- terconnectivity, the malicious attack was able to spread widely. Incidents like this have caused


many electronics manufacturers to realize that they have to implement the proper security processes and tools that are fit for their unique OT needs. Organizations realize that they need to address cybersecurity as an enabler of digital transformation growth and not as a risk or burden.


Partnership Between IT and OT Cybersecurity in production en-


PC MOUNT 3 Ø AC FILTER


EMI FILTER MODULE FOR SPACE LAUNCH VEHICLE


3 Ø AC FILTER FOR RADAR SYSTEM


vironments requires a partnership be- tween the IT and OT departments. OT security must be included as part of the overall security strategy of the organization, but OT security is dif- ferent than IT security at its very core. Security solutions must incorpo- rate support for proprietary protocols and equipment by vendors, such as Siemens, Rockwell Automation, Mit- subishi, and Schneider Electric, to ef- fectively protect ongoing operational activities. Understanding their own operational activities allows organiza- tions to have the right content and context and to tie OT security inci- dents to their business and to analyze what is at risk. Frequently, this involves a ded-


CIRCULAR AND RECTANGULAR FILTER INSERTS


D-SUB AND MICRO-D FILTER CONNECTORS


CIRCULAR FILTER CONNECTORS


icated OT security presence on the shop floor. Such a security solution should be able to integrate into the overall enterprise security stack and be part of the organization’s security orchestration and incident response plan and procedures. Because OT is fundamentally


different than IT, due to the different types of equipment, communications protocols, and day-to-day machine- to-machine behavior, cooperation be- tween the two security teams is crit-


See at APEC, Booth 229


ical. The combination of unique ex- pertise of both groups creates a ben- eficial mix of OT process knowledge and IT security skillsets. Once elec- tronic manufacturers have the right mixture of IT and OT personnel as part of their OT security team, the next step is to analyze the OT envi- ronment and assess the potential risks to the business. Since you cannot protect what


you do not know, a risk assessment process includes discovery of the OT devices, network architecture, and communication patterns. This dis- covery is essential to uncover the true asset inventory, vulnerable de- vices, internet connectivity, and oth- er important data. In addition to as- sessing the actual OT environment, the organization must analyze its se- curity policies and procedures to en- sure that its factories and employees are working according to the indus- try’s best practices. Following the initial risk as-


sessment, an electronics manufac- turer has clear visibility into the business risks. These potential risks need to be prioritized so the organi- zation can focus its efforts on the most critical issues and effectively invest resources to reduce these risks. Proper risk reduction requires implementation of security policies, tools and processes. Clear definitions of OT security


responsibilities and policies on the shop floor align all the stakeholders involved, creating a unified OT secu- rity plan. The right network security, firewall, endpoint, and monitoring solutions should be implemented to enable visibility, threat detection, policy enforcement, and incident re- sponse within the OT network. Last- ly, clear processes regarding critical aspects, such as authorization proce- dures, incident handling and securi- ty management, should be defined to further protect an electronics manu- facturer’s production lines. Implementing the proper tools


and policies is not enough and is def- initely not a one-time task. Electron- ic manufacturers must realize that OT security is a continuous task. The organization needs to constantly monitor its security posture, current risks and threat landscape and as- sess if it has the proper capabilities in place. Ongoing risk measurement and reduction and implementing se- curity as part of the OT culture is an integral part of IIoT and enables the growth of the fourth industrial revo-


lution. Contact: SCADAfence, 4 Meno-


rat Ha’Moar Street, Tel Aviv, Israel 6744832 % +972-3-763-0785 E-mail: info@scadafence.com Web: www.scadafence.com r


March, 2019


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92  |  Page 93  |  Page 94  |  Page 95  |  Page 96  |  Page 97  |  Page 98  |  Page 99  |  Page 100  |  Page 101  |  Page 102  |  Page 103  |  Page 104  |  Page 105  |  Page 106  |  Page 107  |  Page 108