Go To

What is Cybersecurity? Everything You Need to Know

Maximizing Industrial Network Security

Protecting critical infrastructures from cyber-attacks and threats has become an important objective for government and enterprise organizations. Especially as infrastructures are increasingly connected with networks.

Previously, security was only a topic for the IT (Information Technology) industry. For example, the virus protection of PCs, how to keep personal passwords and information from being stolen, how to prevent the company's network from being hacked, etc. It was hard to imagine that one day automated factory manufacturing systems could be hacked, thereby paralyzing the factory's manufacturing. 

Convenient 30W PoE to power connected devices

Information Technology and Operational Technology

Differences between IT and OT

In order to effectively prevent critical infrastructures and IACS (Industrial Automation and Control Systems) from being invaded and attacked by cyber hackers, causing harm and loss, safety and security considerations and solutions must not only be considered from the perspective of IT, but also from the perspective of OT (Operational Technology). 

Security PoliciesIT NetworkSecurity
FocusProtect company's business related documents, financial data, IP (Intellectual Property)Protect human and physical asserts for continuous operations with high efficiency and safety
Priorities1. Confidentiality 2. Integrity 3. Availability1. Availability 2. Integrity 3. Confidentiality
Type of Data TrafficData, Voice and VideoData, control information, real time status, safety information
Implications of Cyber-attacksEconomic losses, loss of confidential dataStop processes or services, Physical or environmental damage, endanger the safety or health of personnel
Upgrades and Patch ManagementDuring up time, ASAPScheduled During Downtime (months, years), ASAP if urgent
Infrastructure Life CycleRefresh < 5 yearsLifespan 15+ years
Deployment ConditionsControlled and stable environmentsHarsh environments

Understanding IEC 62443

IEC 62443 is organized into four parts: General, Policies and Procedures, System, and Component

  • The "General documents" provide the overall concepts, terminologies, and overview of industrial security.

  • The "Policies and Procedures" part outlines the requirements and guidelines of establishment of Cyber Security Management System for IACS. The Patch Management for IACS is included in this part as well.

  • The "System documents" provide the technologies, policy, and risk assessment for designing and implementing security systems.

  • The "Component" section addresses the requirements of product suppliers and the devices integrated in an IACS solution.

As one of the major industrial network equipment providers, in addition to continuing to providing customers with the best and complete networking solutions, EtherWAN is investing resources and actively working to obtain IEC 62443 certification today. With in-depth understanding and compliance with the IEC 62443 standard to design secure products, EtherWAN will soon provide customers with products and solutions that meet the world's security standards!

Frequently asked questions on Cyber Security

There are many different aspects of cyber security. These include protecting critical infrastructure, applications, networks, the Cloud, IoT and IIoT. Protection is set up not just against unauthorized access, but also sabotage and software-based attacks. 

More connected devices mean more potential threats. If your refrigerator gets hacked, it will be a costly and troublesome problem for you to have fixed. If the operational technology for the local power company is hacked, the problems will be more widespread and dangerous. Cyber security at all levels, from household appliances to industrial control systems must be implemented and constantly adapted to new threats. 

IEC 62443 is set of standards for cybersecurity in automation and control network systems. Topics are divided into stakeholder and category roles. These roles include operator, service provider, and component manufacturers. Each role is assigned a risk-based approach to activities related to the specific role function. 

*View more of Industrial Network Security and IEC 62443 standard . 

The IoT is the background in which cyber security must be implemented. In many instances, this will require both digital and physical steps be taken to secure devices and infrastructure. The exponential growth of the IoT and IIoT has brought security concerns to the forefront in enterprise, educational, and government institutions. 

With an ever-increasing number of devices and sensors coming online into the word of IIoT, there is a corresponding increase in the number of access ports, storage media, and communication channels. This has resulted in more potential vulnerabilities to these systems. IIoT security is the securing of devices and data from unauthorized access and other hostile attacks. IIoT is security is broad, protecting against not just hacking, but also malware, sabotage, and other security risks. 

IIoT Cybersecurity standards are sets of best practices to protect organizations from cyber threats. These standards are wide-ranging, and apply to organizations of all sizes and fields. These IIoT security standards include concepts such as IIoT islands, secure connections, and multi-tenancy. 

standard