Page 9 - Industrial Terchnology EXTA 22nd March 2021
P. 9
and what would have the highest consequences if an asset being breached, these hurdles will not
they were compromised. Once identified, it would enable the attacker to gain access to other layers in
be a wise decision to hide the assets behind various the infrastructure.
defences. This is best achieved by realizing a zoning
concept and a defence in depth (DiD) strategy. Industrial plant deficiencies
A DiD is an information security approach in There are a plethora of security risks that industrial
which a series of security mechanisms and controls plants are vulnerable too. We have become
are layered through a computer network. This accustomed to in the IT world – and even our
method is used to protect the confidentiality, private lives when managing our personal data. In
integrity and availability of the network and the data industry, systems can come under denial-of-service
within. attacks, experience data encryption and even the
For instance, external attackers attempting to compromise of operational technology (OT) systems
access plant assets should be met by various layers that are reused for the next attack.
of technology, acting as hurdles. Using this However, there is even higher risk for industry in
methodology, if a credential or secret is lost through the disguised form of manipulation. For example, a
ULTRA-FAST PRESSURE TRANSDUCER
SERIES M5 EXTREMELY COMPACT DESIGN
50 kHz • Operating -50...180 °C • Linearity 0,1 %FS • IP65
Pressure ranges of 3 bar, 10 bar and 30 bar absolute.
Media compatible with oil, fuels, gases and coolants.
Test benches • Leakage • Wind tunnels • Aviation •
Compressors • Explosion waves
keller-druck.com
March 2021 • INDUSTRIAL TECHNOLOGY EXTRA • p9