548,282 active members*
1,953 visitors online*
Register for free
Login Register

Perfection in Protection, Licensing, and Security

The Business Viewpoint of Securing the Industrial Internet

September 2016
Author: Wibu-Systems
The Business Viewpoint of Securing the Industrial Internet

The tone of the many well-meaning discussions about the Industrial Internet of Things (IIoT) varies widely from one viewpoint of unbridled optimism about the seemingly endless possibilities to another filled with apocalyptic doom and gloom about the safety of the planet and everyone on it. Two extreme views perhaps, but there is no denying the fact that security is an issue that needs to be carefully addressed before any of those endless possibilities can become a reality in the industrial internet.

At the core of the IIoT are the industrial control systems (ICS) that are used to sense, monitor and regulate the operations of our critical infrastructure like dams, power plants, transportation systems, the electric grid and the like. In the past 10 to 15 years, there have been multiple examples of accidents that have resulted in the loss of life coming from human or computer errors in working with industrial control systems.

In the IIoT, increasing computing power, interconnectivity, and data analytics techniques have led to a convergence of ISCs and the Internet leading to tremendous gains in industrial performance. With these gains, however, come an unprecedented level of risks as systems originally designed to be isolated are now exposed to sophisticated attacks.

A successful attack on an IIoT system can be serious: interruption or stoppage of operations, destruction of systems, leaking sensitive business and personal data resulting in loss of intellectual property, loss of customers, material economic loss, and damage to brand and reputation. Conceivably, attacks could also damage critical infrastructure handling electricity, water, oil, and gas, and cause irreparable damage to the environment, injury or worse, loss of human life.

Though there is a growing awareness and concern for IIoT security, the ability to address these concerns with step-by-step roadmap has not been well coordinated until now.

The Industrial Internet Consortium® (IIC), an open membership organization with over 240 members to date, was formed to accelerate the development, adoption and wide-spread use of interconnected machines and devices, intelligent analytics, and people at work. The organization is focused on the need to protect our industrial systems from errors and attacks, whether malicious or unintentional. Working collaboratively to protect against industrial security risks, the organization has developed a common security framework and a rigorous approach to assess cybersecurity in IIoT systems. The framework and detailed approach will be published in the coming weeks in the IIC’s Industrial Internet Security Framework Technical Report (IISF).

While the IISF document is written for CTOs and other technical experts, the IIC has also created a white paperThe Business Viewpoint of Securing the Industrial Internet - Executive Overview, to help CEOs and business managers and encourage them to allocate the appropriate resources to their technical experts for education, to assess risks and to plan ahead for IIoT explosion of connected systems.

The white paper presents a background on the emergence of the IIoT and covers many of the basic definitions and core elements of trustworthiness in IIoT systems. The white paper further explains the key system characteristics and how to evaluate an IIoT system, including convergence of Operations Technology and Information Technology, Data Management, and Greenfield vs. Brownfield deployments.

From a business standpoint, the white paper provides business leaders with metrics and key performance indicators, risk assessments and threat identification. It also describes the notion ofPermeation of Trust across the IIoT system lifecycle.

The white paper delivers a brief overview of the IISF document that reflects thousands of hours contributed by security experts for the benefit of all IIoT system deployments.


Blog Archiv

November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
October 2016
September 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016