Industry 4 storm, we seek not only to take off successfully, but also to land safely.
With the information industry, the rapid development of the Internet industry and the arrival of the industrial 4 times, and trend of the integration of industrialization and informatization is more obvious, the industrial control system in the use of computer network technology to improve the new system integration, Internet and information management. Following steam engine, mass production and automation, an intelligent industrial revolution storm swept across the whole industry and led to the development of information technology, automation and intellectualization. The industry called it the "fourth industrial revolution". Looking forward to the whole trend of development, it is not difficult to find that there are too many links with the Internet. Lei Jun, the president of the millet, once said, "pigs can fly as long as they stand in the mouth of the wind." Pan industrial 4 concept has reached a consensus in the world, and produce a different strategy and planning versions in different countries, such as Germany's industrial 4 strategy, the Internet industry, the integration of the two China, in China as an example, the industry leader in automation units, and research institutions also act quickly, vigorously layout, in order to reach a blueprint for the future development of the production and research of the high degree of consensus. As a result, it seems that China's industrial field, which is represented by the manufacturing industry, is no longer a problem by borrowing the east wind from the industrial 4.
However, the words of a popular word "low tide, before we know who is swimming naked, the Internet bubble burst in 2000 due to the recession scar is still in pain, there are about 50% Internet companies not lived in 2004, the company does not have a strong effective security system when the concept of heat retreat after most did not survive this wave of winter, to meet the real Internet era. The risk of network information security is the ability to resist industry 4 era of enterprise security system is an important part of Mr. Long Guodong from the CEO company Weinute industrial safety specialist said: "in the face of the 4 industrial storm, the industry is ready for the thinking, after the wind, how safe landing. At that time, who had the parachute, who had the safety rope at a glance. Industrial 4, with the core features of intelligence, is undoubtedly the thickest one on this safety rope.
Industrial control security, that is, the network security of industrial control system. The industrial control system network is made up of industrial automation production equipment, such as PLC, RTU, DCS system. Unlike IT network, the industrial control network has its own communication protocol and communication mechanism. Because of the relatively closed environment in history, the industrial control system pays more attention to the function of the system, and the attention to security is relatively lack. Therefore, there are a lot of safety defects in the industrial control system. These defects make the industrial control system extremely fragile and bring great hidden danger to the safety production. With the deepening of industrial 4, the industrial control network will be more and more open, and it is impossible to completely isolate. Therefore, industrial control safety protection can not only consider physical isolation between simple office network information network, production network and control network, but need to consider from a whole. Moreover, because industrial control systems are mostly applied in lifeline industries such as power, transportation, petroleum, chemical industry, nuclear industry and other countries, the social impact and economic losses caused by safety accidents are particularly serious. Because of many purposes such as politics, military affairs, economy, belief and so on, hostile countries, forces and terrorist criminals may take the industrial control system as the target to achieve their goals.
The industrial control security incident is just the tip of the iceberg, and more threats lie around us
The number of industrial control network security incidents increased significantly year after year, according to the control from the U.S. Department of Homeland Security Industrial Network Emergency Response Team (ICS-CERT) and OSVDB industrial network security data show that since 2010, major industrial control network security incidents show explosive growth, from 39 growth in 2010 to 256 in 2013. In the past 2013 years, hacker attacks on various industries in China increased by more than 15 times more than in 2009, and 30% were aimed at national infrastructure. In recent years, according to information security incidents in various industrial sectors in the industrial control system has been considered relatively safe and relatively closed illegal organizations and has become a target for hackers, hacker attacks are spreading from the open Internet to the relatively closed industrial network, attacks and malicious tools also change rapidly as from everyone for having heard it many times. The Stuxnet worm, "Earthquake Network" Flame "flame" virus to the 2014 Dragonfly "super plant virus. These are just the "iceberg corner" floating on the surface. More potential threats and vulnerabilities are hidden in seemingly safe industrial control network. Through search engines like SHODAN, we can find many undefended industrial control devices. In the era of industrial 4, the two-way information interaction between management network and production control network is becoming the norm. By that time, the threat of industrial control network will rise thousands of times.
Industrial control system is not the source of the world, to create a credible "white environment" in order to keep safe and safe
The traditional industrial control networks, analogous to the legendary "land of idyllic beauty", the use of the security isolation gateway and antivirus software: external control network "isolation", the internal is considered to be a complete and reliable network security; between each functional area is less information - "neighbors, laosibuxiangwanglai"; the host system vulnerability due to long-term patching, antivirus software, virus database is not a long-term upgrade, basically is in the state of "Doors are unbolted at night.". With the Internet