Sunteți pe pagina 1din 18

UNIT – 3 : LESSON ONE

SECURITY OF PRODUCTION LINE IN CORPORATES

5.24 Objective

The objective of this unit is to explain how to create, educate, and enforce security policies
in any kind of industrial set up. The aim being to obviate industrial espionage and sabotage with
unsecured network and assembly line procedures related to the production line. At the end of this
unit, the student should be able to appreciate the need, guidelines and the methods of securing the
production lines and the administrative backup necessary to ensure un- interrupted flow of goods,
material and products .

5.25 Introduction

To ensure comprehensive protection of industrial plants, factories and conglomerates from


sabotage, labour problems, internal and external threats including cyber attacks, all levels must be
protected simultaneously – ranging from the plant management level to the field level and from
access control to copy protection to the production line.

Today’s manufacturing industry utilises expensive industrial machinery the safeguarding of which
itself presents huge security challenges. The exponential growth of connections and integration
between people, processes, data, machinery and manufacturing processes also present added
security risks and threats that are often complex and multifaceted.

A production line is actually a set of sequential operations established in a factory where materials
are put through a refining process to produce an end-product that is suitable for onward
consumption; or components are assembled to make a finished article. Any disruption of the
production line will stop operations of that company.

Safety and security measures of the production line are only as good as the people who work at
the facility. It is critical that employees are aware of and adhere to the procedures required before
entering or exiting the plant floor as also the administrative offices. Production line and plant
security starts with conventional building access and extends to securing of sensitive areas by
means of key cards. Tailored industry security services include processes and guidelines for
comprehensive plant protection. These range from risk analysis and the implementation and
monitoring of suitable measures to regular updates. A point to be considered is that production line
security and production line efficiency go hand in hand.

Manufacturers in Japan are known for their efficiency and their ability to continually change as
necessary for the betterment of the organization. Consider assembling a diverse team that cuts
across disciplines to spend a few days tackling a process improvement problem. For example, one
company had a team reconfigure work and storage areas to see where improvements could be
made. Their improvement suggestions reduced setup time from six hours to 40 minutes!

5.26 The Need For Production Line Security

Production facilities and production lines are constantly exposed to dangers. Infected
equipment, unauthorized personnel, and unauthorized access via the network and internet are all
affecting the security status of the plant. Companies must consider numerous factors in order to
develop their own industrial and production line security measures. Building on this, guidelines
and measures must be defined for each area. These help to guarantee a high level of security to all
parties involved without limiting productivity. In this way, industrial security becomes one of the
central tasks of management.
These organizational measures include definition of responsibilities, awareness training for
production personnel, and handling of identified/eliminated vulnerabilities while taking the
production process into consideration.

A few of the implications and impacts of security breaches for manufacturers and production lines
are as under:

 Theft or loss of proprietary or confidential information and intellectual property.


 Downtime in factories and lost productivity – potentially very severe.
 Violation of regulatory requirements.
 Loss of public confidence and brand.
 Economic and physical loss to the organisation/factory/corporate office.

2
 Impact on national security (especially pertaining to sensitive equipment and military
hardware manufacturers).

With most manufacturing processes and office functioning now computer based, according to
Symantec (an American technology company headquartered in Mountain View, California, USA),
the manufacturing business sector was the most targeted in 2013, accounting for 24% of all
targeted attacks. Of those attacks, industrial networks topped the list of systems most vulnerable
to cyber security issues. Additionally, the number of attacks on industrial supervisory control and
data acquisition systems doubled from 2013 to 2014 and has increased gradually. Unfortunately
for manufacturers, 91% of breaches took just hours or less to perpetrate, yet more than 60% of
attacks took months – or even years – to detect. This considerable gap gives cyber attackers plenty
of opportunities to access a manufacturer’s trade secrets and sensitive production data. Two main
aspects of production line security are:

 Plant Security. Plant security involves physical protection and security management for
automation systems. Plant security prevents unauthorized persons from gaining physical
access to critical components using a number of different methods. Plant security starts
with conventional building access and extends to securing of sensitive areas by means of
key cards. Tailored industry security services today provide processes and guidelines for
comprehensive plant protection. These range from risk analysis and the implementation
and monitoring of suitable measures to regular updates as well as network security.
 Access Control. Managed access control is an essential factor in safeguarding critical
company areas. Management of this aspect ranges from access control itself coupled with
intelligent video surveillance solutions to complex, integrated command and control
platforms.

Some of the other aspects which affect the continuity of production lines include the following.

 Hazardous Materials.

A hazardous material is anything that has the potential to harm a human or animal. In
production facilities, potential hazards include corrosives, carcinogens, oxidizers,
flammable chemicals and chemicals that damage the mucus membranes, eyes, lungs and
skin. Direct contact with these chemicals can occur if they splash onto the skin or into the

3
eyes. Workers may also inhale chemical fumes or ingest chemicals by touching their
mouths after working with hazardous materials.

Electrical Safety

Some production workers perform duties that put them at risk of electrical accidents. These
accidents occur due to loose connections, faulty wiring, overloaded circuits or unsafe work
practices. Electrical accidents can cause burns, shock, cardiac arrest and death, making
proper training critical. Employees should be instructed to follow established electrical
safety procedures and use insulating equipment when necessary.

 Fire Safety

Some production workers use tools and equipment that produce flames or considerable
amounts of heat. This increases the risk of fires in production facilities. OSHA requires all
employers to have fire exits that lead directly outside. These doors must remain unlocked
any time employees are in the building. Employers are not required to provide portable fire
extinguishers, but if they do, employees must be trained how to use them properly. Smoke
detectors, sprinkler systems and manual pull alarms should be inspected and tested
regularly to ensure that they'll work if needed.

 Repetitive Stress Injuries

Repetitive stress injuries can occur when a worker makes repeated motions for long
periods. Production workers who work on assembly lines typically perform the same
actions throughout their shifts, making them vulnerable to these injuries. Examples of
repetitive stress injuries include trigger finger, carpal tunnel syndrome and bursitis.

 Hearing and Vision Safety

Working in a production facility exposes workers to hazards that can affect hearing and
vision. Noisy workplaces can damage the hearing of workers, so employees in such
environments should use earplugs or earmuffs to reduce noise exposure. Eye injuries are a
concern for those who work with chemicals or on machines that produce sawdust, wood

4
chips, metal fragments and dust. Goggles or safety glasses should be worn to prevent
foreign objects from causing eye injuries. Welders should wear face shields to protect their
eyes from the sparks and heat of welding torches.

 Sabotage

Security breaches can come from multiple sources and threats to a production line. For
example, security breaches can be both intentional and unintentional. A disgruntled
employee intentionally sabotaging a batch of product doesn't have the same intent as an
unauthorized employee stepping in to cover for a sick colleague and creating a batch error,
yet the result is still the same, a ruined product batch. Security for the production line needs
to take into consideration every level of breach, from the beginning to the end of a process.

5.27 Defining Guidelines

Companies must consider numerous factors in order to develop their own industrial security
measures. Building on this, guidelines and measures must be defined for each area. These help to
guarantee a high level of security to all parties involved without limiting productivity. In this way,
industrial security becomes one of the central tasks of management.
Other organizational measures include definition of responsibilities, awareness training for
production personnel, and handling of identified/eliminated vulnerabilities while taking the
production process into consideration. Organizations should avail services of consultants dealing
with security programs, conducting risk assessments, implementing security programs and
executing security system engineering and design. Managers should also consider requiring
professional security certifications such as Certified Protection Professional (CPP), Physical
Security Professional (PSP) or the Certified Security Consultant (CSC).

When the time comes to evaluate and purchase security systems, failing to properly design access
control, intrusion detection and closed-circuit television (CCTV) surveillance can result in wasted
funds, ineffective security and even potential liability.

Installing a security system should be approached no less systematically than building a new
facility and should include drawings and properly structured specifications. Buyers of security
products are frequently left hungering for critical components such as record drawings, training

5
and systems that operate in a way that meet the specific needs of the plants in which they are
installed. In fact, it is not uncommon for organizations to "turn off" systems for many different
reasons since they can be disruptive to business and often result in unnecessary police response
after hours.

Plant managers and organisations which purchase physical security systems can avoid failures by
following these steps:

 Risk Analysis: Conduct a proper risk analysis to ensure the design basis of any physical
security improvement considered for the plant. Start with the potential problems one is
trying to fix. Often vendors want to begin by talking about how security systems should be
employed, which is a tactical (and not strategic) approach. It's putting the cart before the
horse
 Specify Requirements: Identify requirements for security improvements and insist that
the consultant carefully selects products that meet those specific requirements. There are
new products being launched on a weekly basis that makes it a full-time job to keep up.
For example, if one is installing a security camera and requires facial recognition from the
video, one will need technology that is capable of achieving a high image resolution. Using
a standard resolution camera, the field of view of the camera can be no wider than 16 ft. to
achieve facial recognition with standard video. By simply picking camera locations without
any consideration as to how much real estate the camera is going to view is inviting less
than satisfactory results once cameras are installed.
 Internal Review: Ensure specifications and drawings are reviewed and approved, at
minimum, on two separate occasions as the project matures to ensure that the
implementation of physical security measures will not unduly interfere with operations.
Management involved in this review process should include: maintenance, quality, safety,
human resources and information technology.
 Rely On A Consultant: If competitive bidding will be used, the consultant-designer
should assist the plant in identifying qualified representatives of the security products being
considered.

6
 Comparison Shopping: A technical and commercial comparison of vendors' bid
submissions should be conducted to identify the best solution for the plant. Purchasing on
low bid alone is never recommended.
 Ongoing Support: While the system is being installed, the designer should be providing
support such as reviewing vendor submittals, responding to requests for information and
conducting periodic reviews of the system throughout installation to ensure compliance
with specifications and drawings.
 Benchmarking: The final step before a system is accepted and the warranty begins is a
complete end-to-end test to ensure: all devices work properly, programming has been
finalized to meet plant requirements, training has been properly conducted and drawings
have been submitted.

These simple vetting techniques and procedures can ensure that manufacturing facilities meet
emerging regulatory requirements, as well as protect the corporate brand and provide a
reasonable level of security against criminal and terrorist attacks as well as other production line
related crisis. Preparing for unknowns is a priority in all phases of business, and corporates are
certainly no exception.

5.28 Production Line And Cyber Security

Future, production facilities will be able to communicate and interact with one another, and
machinery will often be remote serviced. But no company boss wants to run the risk of opening
the door to industrial espionage and sabotage with unsecured networks.

Back in June 2010, malware computer programme Stuxnet hit the headlines as the first computer
worm to target modern supervisory control and data acquisition (SCADA) and programmable
logic controller (PLC) systems. Industrial control system (ICS) users became aware of how
software hackers and malware could affect operations .Five years on, everything has changed.

With the Internet of Things (IoT) becoming a common way to connect across the manufacturing
industry, cyber vigilance is more important than ever. One of the most recent targeted malware
attacks, Dragonfly, used at least three attack mechanisms, including taking over the software
download sites of trusted ICS and SCADA suppliers. The download packages look legitimate, but
when installed onto a control system the malware comes to life.

7
It's not just individual systems that are falling victim to malware attacks. An attack on a smart grid
- an energy distribution network that uses smart meters, appliances and efficient renewable
resources - affects more users than one on an individual meter, therefore the potential for damage
is much more significant. In the most obvious smart grid attack, an attacker would take control of
the grid in order to disrupt the provided services. The attacker could also update the firmware on
the devices, making the attack more difficult to mitigate.

Because of the potential for attack, it's important for manufacturers to understand how to protect
their software from the different types of malware.

According the research giant Fraunhofer Gesellschsft, it will soon become a reality in
manufacturing that products along the production line will know where they are, which steps they
have already completed, and what they still need to become a finished product. Production
facilities will be able to coordinate their work steps and exchange information with one another,
and there will be no need for technicians to set foot in the production halls for servicing, with
machinery inspections carried out remotely instead. In a word: products and plants will be
intelligent. This is also referred to as ‘Industry 4.0’ - meaning industry of the fourth generation,
following mechanisation, electrification and digitisation.

For this to be possible though, facilities will use a data network to communicate with one another,
and even the products themselves will have to ‘log in’. Human beings will use this network
connection to control and monitor production too - to keep an eye on plant operation even if they
don’t happen to be in the production hall. On top of this, there will be remote maintenance and
remote software updates. So for all these functions to work, one thing is indispensable: secure
access that keeps industrial pirates and saboteurs out.

Certainly, businesses can use a normal internet connection for this form of data traffic, securing it
through a VPN. “But there’s something many people don’t know: there are VPNs and there are
VPNs - and not every VPN access is secure,” according to Bartol Filipovic, division director at the
Fraunhofer Institute for Applied and Integrated Security (AISEC) in Garching, Germany.

That is why offices, factories and plants need to instal routers that offers secure VPN access.
Authorisation and firewall functionalities provide additional access protection. The necessary
security protocols can also be integrated directly in the industrial customer’s plants and machinery.

8
On the one hand, the system protects companies from spies trying to hack their way into the
network from off-site locations. On the other hand, it also outwits data thieves trying to coax
secrets out of routers and circuit boards on location. To prevent this sort of an attack, many
technologies are available, one being a special film affixed to security-relevant casings
immediately reports any attempts to unscrew the protective covering to access security-relevant
data. The film is affixed to the router casing, or directly onto the circuit boards - the board
containing key control elements such as microcontrollers, chips and other security-critical
processing units - and sealed shut at multiple points. If the router is switched off, all of the software
it contains is stored in encrypted form. If it is in operation, though, it needs the decrypted program
code. Each decryption key is a function of the properties of the protective film. And if these
properties are changed - by tearing open or drilling into the film to reach the circuit boards, for
instance - the film detects the attack in a few milliseconds and responds immediately: it deletes all
of its unencrypted, security-relevant data.

The advantage of such technologies is that unauthorised intruders cannot get to the software. Data
deletion is no problem for the business and all that a company has to do is reinstall the software
and affix a new protective measures like the film mentioned. Secure communication software and
hardware are fundamental to the evolution of production toward digitisation and Industry 4.0; and
protection against espionage, sabotage and product piracy is crucial to innovation and a strong
competitive position.

5.29 Digital Surveillance And Production Line Security

Digital security can help raise the bottom line, increase efficiency, reduce theft, reduce liability
and better manage an organization through almost every step of an order. From marketing and
presales to production and shipping, systems can be used to better manage and promote the
organization and its products. While at the same time creating a safer environment for the floor
and the employees.

Since a standard IP infrastructure is used in most manufacturing facilities, network surveillance


cameras that are built on an open platform can be integrated into a facility's existing system. This
is a big advantage of using a network surveillance cameras is that network cameras can be easily
integrated into industrial manufacturing environments such as production lines to automatically

9
perform visual inspections, to monitor production line efficiency, and to enable remote assistance
for maintenance.

Additionally, network surveillance cameras can support intelligent video processing and video
analytics on the edge, they can also be utilized to perform visual inspections for a specific step in
a production line, alert the manufacturer to labels missing, caps not positioned correctly, or missing
solder.

Another advantage of network surveillance cameras is that they can be easily integrated into
industrial manufacturing environments such as production lines to automatically perform visual
inspections, to monitor production line efficiency, and to enable remote assistance for
maintenance.

Digital security and networking also increase efficiency and help in smooth flow of the 'production
line'. In 2011, the SEAT factory became the production house of the Audi Q3, the first luxury car
assembled in Spain. The use of barcodes in automotive factories to keep track of parts during the
production process is standard. At the SEAT factory, they wanted to take extra measures to avoid
delays and facilitate workflow. As a result, over 100 Axis cameras were implemented to
complement the existing barcode scanning system for a visual verification system. By taking
images of the barcodes that were identified as possibly containing errors, which were then sent to
an emergency data-entry computer, the system provides visual verification that serves as a backup
to the scanned barcodes. With images of the barcodes, in the event of a barcode scanning error,
vehicles do not have to be physically moved by operators in order to be re-scanned. Additionally,
the cameras were also used to monitor the transport of car bodies throughout the facility.

After cameras are in place, video management software (VMS) comes in to help manage, access,
and control the images and recordings; however, its usefulness in the automotive industry has
helped to not only do the aforementioned tasks, but also streamline and improve the production
process with added advantage of monitoring and security.

When Nissan Motor Manufacturing UK was looking to improve production efficiency at their
facility, they sought a solution that could not only be integrated with their current set up, but also
with over 300 network cameras from various manufacturers to monitor production lines and their
facility. Nissan UK has always used machine vision tools, including highly specialized industrial

10
cameras used to inspect individual processes to decide whether the correct part is in its exact
location, take precise measurements, and act as “eyes” for the robots. However, these cameras do
not give an overall view of a process, as they are designed to focus on one specific movement or
task.

Surveillance solutions provide production floor managers with an effective tool for monitoring
multiple areas simultaneously. Managers can actually see more than one place at a time. This
management tool will help increase employee productivity and make managers more efficient by
freeing up time to focus on other important responsibilities.

 Benefits and features:


 Increase productivity.
 Increase efficiency.
 Decrease theft.
 Production line.
 Shop management.
 Coverage areas:
 Stockrooms.
 Tool rooms.
 Warehouse.
 Crating/Shipping areas.
 Receiving areas.
 Parking lots.

 Shop/Process Management:

 Production lines.
 Production bays / floors.
 Assembly areas.
 Quality control.
 Prefab areas.

11
Efficiency in any industry is important, but in competitive, high production Industries, efficiency
is paramount to a facility's success. While “lean” practices help manufacturers in all industries
reduce waste and boost effectiveness, the additional beyond security benefits of traditional security
products, such as network surveillance cameras and VMS, have proven that the security industry
is not just about catching intruders and controlling access. Offering additional benefits like
production efficiency and workflow management shows that applications of the security industry
are endless.

5.30 Safeguarding The Production Line

The overiding requirement is to have a solution that transforms diverse manufacturing


processes into a unified, tightly integrated, and secure communication system, linking
infrastructure, machines, processes and people (ie the work force). With the solution, one can:

 Securely access machine data on the plant floor, aggregate it, and apply data-analytic
algorithms to determine optimal operations and supply chain actions – improving
efficiencies and reducing costs.
 Share intellectual property securely with global employees, partners, and vendor
ecosystems, helping scale expert resources.
 Mitigate risk with a security posture assessment capability that ensures policy compliance,
operating system updates, and software patch deployments.
 Securely and remotely troubleshoot machines and issues including for new product
introductions.

Security concerns also grow with new threats as manufacturers converge the traditional boundaries
between IT and operational technology systems and organizational silos. The piecemeal product
or technology-driven security strategy is no longer effective. A holistic defense in depth approach
to IT, physical security and operational-technology data security is required to effectively prevent,
detect, and mitigate security threats to company intellectual property, capital assets, productivity,
reputation, privacy, production lines and resources.

For example, a German iron plant was the victim of a cyberattack some time back, and the hackers
got in control of equipment on the production floor and were able to create physical destruction.
Part of the operations had to be closed down due to the attack. Similarly, another industrial

12
company, this time American, accused the Chinese of stealing sensitive information from their
production line. The information enabled the hackers to copy the production, and having your
production methods stolen could mean huge financial losses, both in the short and the long term.

Supervisory Control and Data Acquisition (SCADA) systems and Building Management
Systems (BMS) provide a Human Machine Interface (HMI) with visibility for Operations and
Maintenance (O&M) personnel to the state and health of industrial, electrical and building
equipment assets. These supervisory systems have, for some time, been moving out of
centralized control rooms and onto remote platforms, such as laptops, allowing O&M workers to
view the state of equipment from the field.

Mobile workers have long benefitted from the evolution of telecommunications, particularly with
regard to improvement in end devices. Today, mobility is associated with smart devices, most
notably phones and tablets. They are increasingly preferred over laptops as the communications
device for remote workers. The way in which people interact with mobile devices differs from the
way in which they interact with laptop computers.

Historical approaches to monitor, diagnose, maintain and control industrial and building assets
must be reconsidered. A new architecture optimized for the mobile SCADA and BMS user is
needed.

5.31 Preparation : The Best Defence

The manufacturing environment has undergone many changes in recent years, the result of
globalization, fluctuations in the price of raw materials and consumers’ demand for high quality.
To stay competitive, manufacturers increasingly rely on “Smart Factory” technologies and
dependence on cyber networking. These technologies maximize efficiency, security and quality,
and can be controlled from anywhere, 24/7, with real-time updates from the factory floor. But this
also opens you up to breaches and theft of information. For example, a German iron plant was the
victim of a cyberattack last year, and the hackers got in control of equipment on the production
floor and were able to create physical destruction. Part of the operations had to be closed down
due to the attack. Some time ago another industrial company, this time American, accused the
Chinese of stealing sensitive information from their production line. The information enabled the
hackers to copy the production, and having your production methods stolen could mean huge

13
financial losses, both in the short and the long term. And these companies were not alone. Statistics
from American authorities show that cyberattacks on the industrial sector in the US increased 20
percent in the last few years.

Industrial companies need to act proactively on this issue. There is a need to align physical plant
security with digital and network security. There is a need to keep sensitive equipment in a guarded
physical environment. One needs to control digital access roles on everything from production line
terminals to the management’s mobile phones.

Factories, production lines, warehouses, distribution centres, and laboratories: they all need
integrated communication and security systems for operational and security purposes. Consider
the following approaches to enable a factory, industry or organisation to have a greater defense.

 Create, Educate, and Enforce Security Policies. Many organisations do not even have
the most basic security policies written down. Clear instructions should exist as to who
should be able to access what assets. Standing orders should define acceptable asset use,
and define reporting mechanisms for events. Written policies should also contain an
incident response plan including any procedures to restore critical production systems after
a security event.
 Lock down Of Factory/Industry/Organisation with Defense-in-Depth Security. The
more connections in the manufacturing environment, the more chances for a breach. No
single technology, product, or methodology can fully secure a network. Protecting critical
manufacturing assets requires a holistic approach that uses multiple layers of defense—
physical, procedural, and digital (network, device, application)— to address different types
of threats. A basic mapping exercise will help in getting started, providing an inventory of
all the devices and software on the network.
 Strengthen The First Line of Defense. Physical security is especially important in
manufacturing. Some of the most severe damage comes from the inside, when entry is
gained from the factory floor. Whether it’s preventing inventory lift, data loss or
intellectual property theft, companies can benefit from a comprehensive physical security
solution integrated with a secure wired and wireless industrial network. One can protect
PLCs and other play assets with physical access restrictions like locks, key cards, and video

14
surveillance. As mentioned earlier, in places where it’s practical, one can also add device
authentication and authorization, plus encryption. IP cameras can be installed to monitor
the property perimeter of large warehouse, office corridors, and all delivery gates. System
alerts notify employees when a door to a restricted area is open, with links to live video.
Doors can be opened and closed by pressing a button on an IP phone.
 Control Who Is On The Network With Device Profiling. People are bringing their own
tablets, phones, and other mobile devices into the manufacturing workplace, making it
more difficult than ever to complete network visibility and control. With device and
identity profiling services, you can monitor, authenticate, and control all the users, devices,
and even applications connecting to the network with a centralized, policy-based approach
to security.

5.32 Having A Plan Of Action

One of the biggest challenges faced by companies is establishing a single point of control
over their production line and well planned SOP's (standard operating procedures) in place. To this
end, it is important to:

 Appoint a person or committee to be responsible for the oversight of your security program
to include professionals responsible for cyber security and the company network.
 Implement an incident reporting procedure and investigate all actual or potential security
breaches.
 Implement a background check procedure that applies to employees, contractors and
temporary employees working at your facility.
 Develop a comprehensive security awareness and training program for management,
personnel with security duties and all other employees and contractors.
 Implement an effective perimeter access control system to prevent unauthorized access and
to channel authorized persons to appropriate checkpoints for screening.
 Establish effective internal access control measures that prevent visitors from entering the
plant, as well as persons with general access from entering security sensitive areas such as
laboratories, mixing rooms and computer rooms.

15
 Implement operational controls such as management of incoming materials, storage for
raw materials, water and utilities and access to computer systems; protect finished products
from tampering; manage threats by mail.
 Establish a security record keeping system.
 Develop a crisis management plan to cover common emergencies (eg plant disruption,
assembly line disruption, threat of contamination, sabotage, unrest, breach of security,
recalls).
 Implement compliance and quality assurance programs to validate security effectiveness.

Key benefits of a well coordinated action plan will help in the following.

5.32.1 Warning and Life Safety

 Protecting lives and corporate assets.


 Efficient, well-coordinated warnings, alarms and evacuation support in
emergency situations.
 Instant communication of vital information to all or selected areas/zones.
 Built-in automatic early warning of emerging system problems.
 Compliance with legal and corporate regulations.
 Safe to operate in areas with explosive atmospheres.

5.32.2 Communication

 Optimising workflows and boosting efficiency through communication.


 Reducing risk of workplace accidents and hazards.
 Fast call connections and superior ease of use.
 Conference calls (“party lines”) for fast information distribution.
 Group calls and announcements via Intercom stations.
 Integration of PA/GA, mobile radio communication and telephones (land-lines
and mobile radio) into the Intercom system.

16
5.32.3 Integrated Systems

 Integration of other systems like CCTV and building management systems on a


single operating platform.
 Saves money by eliminating the need for extra hardware.
 Enhanced functionality, thanks to individual systems pooling their resources and
working. together in a team-like fashion.
 Reduced complexity, thanks to seamless, fail-safe interfaces.

5.32.4 Security

 Secure, restricted access to industrial premises or specific areas for authorised


personnel.
 Protecting material assets and corporate information.
 Monitoring, control and automation of various industrial equipment.
 Event logging and audio/video recording.

5.33 Conclusion

There is no such thing as 100% security. And the security that does exist never lasts forever.
Internalizing this fact is an essential step toward creating the best-possible industrial security
solution and continuously adapting it to new threats. With expanding implementation of new
systems and automation of assembly/production lines, a number of mission-critical systems
become a necessity. To increase safety and efficiency of the production line, most manufacturing
operations have a degree of human injury risk. Today, there is also a thrust to automate a process
using robots is to improve workplace safety. And again, robots can significantly elevate the
nature of work by removing people from dull, dirty and dangerous tasks. High-risk tasks like
unloading parts from a fast-moving press or working with molten metal are definitely not tasks
suited for human operators. In these cases, robots are invaluable in lowering the risk of injury or
death. This is another aspect which affects the safety, security and speed of a production line.

An unsafe workplace leads to fear-driven human inefficiency, lowered production rates, higher
insurance costs, and high employee turnover. Conversely, safe workplaces and secure production

17
lines boosts morale, increases employee retention and lowers costs, which ultimately improves
the bottom line. Corporate and Industrial Security is a dynamic and complex topic requiring
continuous monitoring and adaption of new security measures for production lines.

18

S-ar putea să vă placă și