infrastructure for a connected world

Cyber Security Essentials: Part II

The second installment of the Cyber Security Essentials series looks at what a robust network security system looks like, with insights from an ethical, professional hacker.

Control Engineering
Copyright 2015 CFE Media LLC
Syndication Source: Control Engineering

Courtesy: Maverick TechnologiesIn Part I of this series, we outlined some of the most common cyber attacks and some of the simple ways a user can guard against them. I sat down with an ethical hacker to hash out what robust network security looks like.

The interview: He’s a hacker, but it’s okay…

A long-time friend of mine has a pretty unique job; he’s an ethical hacker. While this sounds like an oxymoron, I assure he’s not. Tim Garrity is an information security analyst for TraceSecurity Inc. Companies often hire security firms like TraceSecurity Inc. to hack their facilities using a variety of methods. The idea is that finding out about a security gap from a friendly consultant is far more favorable than finding it out from someone with nefarious intentions. Here are a few things I asked him about:

Q: We’ve heard of cyber security, what is it?

It’s a buzzword. Essentially, it’s the overall view of technical controls that should be in place to ensure data/systems are not compromised. Technical security and physical security should work together for network security. You want to have multiple layers of defense in case one layer is compromised.

Q: Multiple layers?

If an intrusion protection system (IPS) and intrusion detection system (IDS) device is compromised, you want a firewall to catch it. Then you’d hope antivirus software would catch an intrusion beyond that, along with host-based intrusion prevention/detection (locally installed firewall on the workstation).

Q: Okay, so can you give me an idea of what a well guarded system would look like?

Ideally, you’d want an IPS/IDS in place as the perimeter of defense. Often the IDS is monitored by a third party to supervise network activity and alert the company when suspicious activity is discovered. Next, your firewalls will contain a rule set which act as a barrier to unauthorized network traffic. Beyond that, biometrics are pretty expensive, but RFIDs such as smart cards are more reasonably priced. That’s all from a hardware standpoint.

Q: Alright, so what sort of software safeguards would you suggest?

First of all, antivirus software should be centrally managed (i.e. a central server pushes out the latest updates and ensures devices are updating correctly). Also, it’s important to ensure an end-user cannot disable this. Similarly, a centralized patch-management system is a necessity. It doesn’t make for a thrilling topic to talk about security updates for your operating system, or firmware updates for any routers, switches or firewalls used, but it can get pretty exciting for everyone if one of these is exploited by an unethical hacker! Even those annoying Adobe Flash and Java updates are important. Now you’ll have to excuse me while I restart my laptop...

In the third and final installment, we’ll get Tim’s thoughts on ways to protect your plant from people— the careless to the nefarious.

This post was written by Josh Bozeman. Josh is a Proposal and Estimating Specialist at MAVERICK Technologies, a leading automation solutions provider offering industrial automation, strategic manufacturing, and enterprise integration services for the process industries. MAVERICK delivers expertise and consulting in a wide variety of areas including industrial automation controls, distributed control systems, manufacturing execution systems, operational strategy, business process optimization and more.

MAVERICK Technologies is a CSIA member as of 3/5/2015

Powered by ContentStream®, view the original article and related content on Control Engineering.