The world of IT comes to us, part 2

“If you can ping it, you can own it.”

12/22/2011


In the new video that revisits the DePaul University cyber security class, we meet two new students, Ahmed and Eiyad. One of the great statements that I heard with reference to hacking PLCs, which unfortunately didn’t make it into the final edit, was from Ahmed. He said, “If you can ping it, you can own it.” Which is to say, if you can get through the network to the PLC, you can make it do whatever you want because the PLC has very little protection of its own.

There are ways to protect a vulnerable PLC by hardening the network, but as Alex pointed out, few network devices and switches allow you to use security measures such as RADIUS or TACACS. On the other hand, some do. If you’re looking at networking products, those are the ones you may want to look for.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance

(copy 5)

click me