02.01.2014 Views

Click to download Ethernet Basics manual - Grant Industrial Controls

Click to download Ethernet Basics manual - Grant Industrial Controls

Click to download Ethernet Basics manual - Grant Industrial Controls

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Au<strong>to</strong>mation networks & Security 107<br />

Decision<br />

The classic firewall protects against hackers, worm viruses and spyware. The software programmes<br />

protect the network or the specific computer against the outside world and allow<br />

only trusted messages <strong>to</strong> pass. One of the objectives is <strong>to</strong> block all suspect programmes<br />

that look for a connection with the Internet from the own location. In addition, there are<br />

programmes in the office IT such as anti-virus programmes, anti-spyware and anti- adware<br />

programmes that block every inbound file, check for threats hidden within the database and<br />

then declare the file clean or place it in quarantine. They also screen all called up files for the<br />

presence of viruses, spyware and adware that are included in the database. The principle<br />

of this IT protection is that the firewall views and analyses all inbound and outbound data<br />

traffic, data files, programmes,... Such firewalls slow down the system and can even prevent<br />

the programme from functioning, if necessary.<br />

In order <strong>to</strong> realise a more industry-compatible firewall, techniques will have <strong>to</strong> be used that<br />

guarantee in the first place that there will be no delays and still guarantee security and<br />

reliability. One can use safe communication channels between, e.g., PLC and the master<br />

computer or data servers. In order <strong>to</strong> ensure real-time functioning, no delay should occur<br />

when checking the data that pass that firewall. Other technologies will have <strong>to</strong> be applied.<br />

An option is <strong>to</strong> check the applied pro<strong>to</strong>cols instead of the actual data.<br />

9.3.5 Standardisation with regard <strong>to</strong> security in au<strong>to</strong>mation networks<br />

Introduction<br />

ANSI/ISA 99 gives directives for the carrying out of risk assessment, the setting up of a socalled<br />

cyber security management and carrying out that management. The standard is set<br />

up in collaboration with end users, system integra<strong>to</strong>rs and suppliers. The ANSI/ISA 99 norm<br />

is currently under development. Currently, 2 parts are available.<br />

Figure 9.4: The ANSI/ISA 99 standard<br />

Figure 9.4 shows an overview of the ISA 99 standard. Part 1 is meant <strong>to</strong> be a framework<br />

around all the other parts. At the moment, only part 1 and part 2.01 are available.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!