DESIGN WORLD FEBRUARY 2022

Page 38

Internet of Things

In the IIoT era, previously unconnected systems are now connected over private or public networks to gain more insights and improve productivity. The downside of this connectivity is that industrial networks are no longer immune to cyberthreats. The upside is a growing chorus of experts are sharing their knowledge to help shore up cybersecurity in industrial networks. Generally speaking, two methods are available for implementing industrial cybersecurity. One method is to secure the foundation of a network in astructure and only allow authorized traffic to flow to the designated areas. The other method involves identi ing critical assets and applying layered protection. Industrial secure routers and firewalls are essential to both of these methods as they are

36

February 2022

Internet.of.Things.2-22_Vs3 MS.LL.indd 36

www.designworldonline.com

|AdobeStock

The first line of defense for industrial cybersecurity deployed at the ont lines to prevent unauthorized access and traffic to industrial networks.

Key criteria for choosing industrial secure routers and firewalls Industrial control systems can apply a defensein-depth approach to protect critical equipment and secure various locations, device cells, function zones, and factory sites on an automation network. Defense-in-depth cybersecurity includes three types of controls: physical, technical, and administrative. First, implement physical controls by segmenting the network and creating boundaries between each segment. Next, apply technical controls by securing network traffic or filtering data packets. Lastly, enhance administrative security

DESIGN WORLD

2/9/22 2:53 PM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
DESIGN WORLD FEBRUARY 2022 by WTWH Media LLC - Issuu