{"id":264,"date":"2017-11-07T07:36:12","date_gmt":"2017-11-07T07:36:12","guid":{"rendered":"http:\/\/61.16.131.205\/feed4ward-control\/?p=93"},"modified":"2017-11-07T07:36:12","modified_gmt":"2017-11-07T07:36:12","slug":"factory-automation","status":"publish","type":"post","link":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/","title":{"rendered":"Factory Automation &#8211; Preventing cyber attack"},"content":{"rendered":"<p>Cyber security is a major concern when designing automation networks, and the approaches to achieving this vary. The traditional method of simply not plugging anything into the machine and leaving it isolated from the outside world is a reliable, but outdated strategy.<\/p>\n<p>At some point you&#8217;re going to connect the machines to a plant network, which allows you to link the production systems together. The obvious next step is to make reports from this data, and this requires a PC which will be connected to the outside world.<\/p>\n<p>When applying security to the network, it is easy to add a firewall at the junction of the plant and office networks. The IT department responsible for the computer probably insisted on having one. By restricting the data into and out of the plant network, the risk to the plant automation system is slightly increased over leaving it isolated. With the plant network forming a protected subsection of a conventionally protected office network, this risk of attack from external threats is effectively mitigated.<\/p>\n<p>This however ignores some major advantages from modern industrial network components such as the Siemens SCALANCE S615, or Allen Bradley 1783-NATR.<\/p>\n<p>The SCALANCE S615 is not only capable of acting as a firewall, preventing attacks from external sources, it is also capable of Network Address Translation, and secure remote access. One S615 at the head of each production line allows the PLCs and HMIs to communicate to the plant network and the software engineer to dial in from the other side of the world, or from their bed. All this is achieved while providing direct protection to the production line.<\/p>\n<p>Chris Hasler<br \/>\nSenior Project Engineer<br \/>\nFeed4ward Control Ltd<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is a major concern when designing automation networks, and the approaches to achieving this vary. The traditional method of simply not plugging anything into the machine and leaving&#8230;<\/p>\n","protected":false},"author":1,"featured_media":75,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Factory Automation - Preventing cyber attack - Feed4ward<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Factory Automation - Preventing cyber attack - Feed4ward\" \/>\n<meta property=\"og:description\" content=\"Cyber security is a major concern when designing automation networks, and the approaches to achieving this vary. The traditional method of simply not plugging anything into the machine and leaving...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/\" \/>\n<meta property=\"og:site_name\" content=\"Feed4ward\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-07T07:36:12+00:00\" \/>\n<meta name=\"author\" content=\"John Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/\"},\"author\":{\"name\":\"John Wilson\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/person\/d84a3603335571ec3f996ab5f4ef6151\"},\"headline\":\"Factory Automation &#8211; Preventing cyber attack\",\"datePublished\":\"2017-11-07T07:36:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/\"},\"wordCount\":287,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#organization\"},\"image\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/\",\"url\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/\",\"name\":\"Factory Automation - Preventing cyber attack - Feed4ward\",\"isPartOf\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-11-07T07:36:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.codethisfor.me\/feed4ward\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Factory Automation &#8211; Preventing cyber attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#website\",\"url\":\"https:\/\/dev.codethisfor.me\/feed4ward\/\",\"name\":\"Feed4ward\",\"description\":\"Automation Systems\",\"publisher\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.codethisfor.me\/feed4ward\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#organization\",\"name\":\"Feed4ward Control\",\"url\":\"https:\/\/dev.codethisfor.me\/feed4ward\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.feed4ward.com\/wp-content\/uploads\/2024\/03\/Feed4ward-Logo-Horizontal-RGB-300dpi-grey.png\",\"contentUrl\":\"https:\/\/www.feed4ward.com\/wp-content\/uploads\/2024\/03\/Feed4ward-Logo-Horizontal-RGB-300dpi-grey.png\",\"width\":1182,\"height\":946,\"caption\":\"Feed4ward Control\"},\"image\":{\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/uk.linkedin.com\/company\/feed4ward-control-ltd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/person\/d84a3603335571ec3f996ab5f4ef6151\",\"name\":\"John Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7971bc45b80d39dff0ac12a376683e7089aa84051e295a3cb23d2305524fa537?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7971bc45b80d39dff0ac12a376683e7089aa84051e295a3cb23d2305524fa537?s=96&d=mm&r=g\",\"caption\":\"John Wilson\"},\"sameAs\":[\"https:\/\/www.codethisfor.me\/\"],\"url\":\"https:\/\/dev.codethisfor.me\/feed4ward\/author\/admincodethis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Factory Automation - Preventing cyber attack - Feed4ward","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Factory Automation - Preventing cyber attack - Feed4ward","og_description":"Cyber security is a major concern when designing automation networks, and the approaches to achieving this vary. The traditional method of simply not plugging anything into the machine and leaving...","og_url":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/","og_site_name":"Feed4ward","article_published_time":"2017-11-07T07:36:12+00:00","author":"John Wilson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"John Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#article","isPartOf":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/"},"author":{"name":"John Wilson","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/person\/d84a3603335571ec3f996ab5f4ef6151"},"headline":"Factory Automation &#8211; Preventing cyber attack","datePublished":"2017-11-07T07:36:12+00:00","mainEntityOfPage":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/"},"wordCount":287,"commentCount":0,"publisher":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#organization"},"image":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/","url":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/","name":"Factory Automation - Preventing cyber attack - Feed4ward","isPartOf":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage"},"image":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-11-07T07:36:12+00:00","breadcrumb":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/2017\/11\/07\/factory-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.codethisfor.me\/feed4ward\/"},{"@type":"ListItem","position":2,"name":"Factory Automation &#8211; Preventing cyber attack"}]},{"@type":"WebSite","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#website","url":"https:\/\/dev.codethisfor.me\/feed4ward\/","name":"Feed4ward","description":"Automation Systems","publisher":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.codethisfor.me\/feed4ward\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#organization","name":"Feed4ward Control","url":"https:\/\/dev.codethisfor.me\/feed4ward\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/logo\/image\/","url":"https:\/\/www.feed4ward.com\/wp-content\/uploads\/2024\/03\/Feed4ward-Logo-Horizontal-RGB-300dpi-grey.png","contentUrl":"https:\/\/www.feed4ward.com\/wp-content\/uploads\/2024\/03\/Feed4ward-Logo-Horizontal-RGB-300dpi-grey.png","width":1182,"height":946,"caption":"Feed4ward Control"},"image":{"@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/uk.linkedin.com\/company\/feed4ward-control-ltd"]},{"@type":"Person","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/person\/d84a3603335571ec3f996ab5f4ef6151","name":"John Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/dev.codethisfor.me\/feed4ward\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7971bc45b80d39dff0ac12a376683e7089aa84051e295a3cb23d2305524fa537?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7971bc45b80d39dff0ac12a376683e7089aa84051e295a3cb23d2305524fa537?s=96&d=mm&r=g","caption":"John Wilson"},"sameAs":["https:\/\/www.codethisfor.me\/"],"url":"https:\/\/dev.codethisfor.me\/feed4ward\/author\/admincodethis\/"}]}},"_links":{"self":[{"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/posts\/264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":0,"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/posts\/264\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/media?parent=264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/categories?post=264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.codethisfor.me\/feed4ward\/wp-json\/wp\/v2\/tags?post=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}