Securing software

Chicago, Ill.—Software security is based on how applications and operating systems are constructed, but security also involves plant procedures, building security, and employee education, among other things, according to key software vendors at National Manufacturing Week, March 3-5, here. Proper software security measures are "very scarcely implemented," according to Dirk Rouffaer, Schne...

01/01/1970


Chicago, Ill. —Software security is based on how applications and operating systems are constructed, but security also involves plant procedures, building security, and employee education, among other things, according to key software vendors at National Manufacturing Week, March 3-5, here. Proper software security measures are "very scarcely implemented," according to Dirk Rouffaer, Schneider Electric Automation. Mr. Rouffaer, giving a security presentation in the Schneider Electric booth, said software security issues extend beyond actual code to local security, procedures, bugs, tampering, and hidden mistakes. Advice includes:

  • Strong access control over local controllers;

  • Encryption for all important data leaving the building;

  • Activity logging for employees;

  • Reverse trace routing that tracks where employees are logged on;

  • Automated backups, and;

  • Firewalls.

For more advice, images, and useful links on the topic—including information from AlterSys, Entivity, Iconics, Intellution, Microsoft, Wonderware, and others—see "Secure your Software," under April "Web Exclusives" at www.controleng.com.





No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me