Sunteți pe pagina 1din 1
Do You Think Your Industrial Networks Are Secure?
Do You Think Your Industrial Networks Are Secure?
Do You Think Your Industrial Networks Are Secure?
Do You Think Your Industrial Networks Are Secure?

Do You Think Your Industrial Networks Are Secure?

Do You Think Your Industrial Networks Are Secure?

Cyber Attacks Frequently Target Industrial Networks

2012 2010 2014 Disttrack aka Stuxnet Sandworm Shamoon 2015 2016 2017 BlackEnergy Industroyer Dragonfly &
2012
2010
2014
Disttrack aka
Stuxnet
Sandworm
Shamoon
2015
2016
2017
BlackEnergy
Industroyer
Dragonfly
& KillDisk

Both IT and OT Personnel Have to Take Responsibility for Industrial Cybersecurity

Have to Take Responsibility for Industrial Cybersecurity The Approach Taken to Protect Enterprise Networks Does not
Have to Take Responsibility for Industrial Cybersecurity The Approach Taken to Protect Enterprise Networks Does not
Have to Take Responsibility for Industrial Cybersecurity The Approach Taken to Protect Enterprise Networks Does not

The Approach Taken to Protect Enterprise Networks Does not Work for Industrial Networks

Enterprise Networks Does not Work for Industrial Networks IT vs. OT Business Analyst CIO Plant Manager
IT
IT

vs.

OT
OT

Business Analyst

not Work for Industrial Networks IT vs. OT Business Analyst CIO Plant Manager Control Engineer IT

CIO

Plant Manager

Networks IT vs. OT Business Analyst CIO Plant Manager Control Engineer IT Architect COO No. 1

Control Engineer

vs. OT Business Analyst CIO Plant Manager Control Engineer IT Architect COO No. 1 Priority Focus

IT Architect

COO

No. 1 Priority

Focus

Protection

Target

Environmental

Conditions

Con dentiality

Availability

Data integrity is key

Control processes cannot tolerate downtime

Windows computers, servers

Industrial legacy devices, barcode readers

Air-conditioned

Extreme temperatures, vibrations and shocks

IT
IT
Extreme temperatures, vibrations and shocks IT A comprehensive understanding of industrial cybersecurity

A comprehensive understanding of industrial cybersecurity allows you to take a holistic approach to protect your networks.

you to take a holistic approach to protect your networks. Things You Should Know When implementing

Things You Should Know

When implementing industrial cybersecurity

1

24 24

1 24 24 Industrial control systems cannot endure downtime even for a few seconds.

Industrial control systems cannot endure downtime even for a few seconds.

systems cannot endure downtime even for a few seconds. 2015 2010 2 The legacy devices used

2015

2010

2

The legacy devices used on industrial networks often do not have extensive security features, which creates weaknesses and potential vulnerabilities.

3

IEC 62443

Industrial control systems often contain a wide variety of operating systems and devices from different vendors. When it comes to security measures, there is no uni ed way to enhance security.

3 4 4 2 6 C Management E Network I Devices
3
4
4
2
6
C
Management
E
Network
I
Devices

Moxa takes a holistic approach to cybersecurity for industrial networks. We offer rugged products that have enhanced security features and network management software that allows you to view the security status of your network.

For more information, please visit our website:

www.moxa.com/security