Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

InTech December 2021 - 14

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CONNECTIVITY AND CYBERSECURITY

At the same time, a new challenge will onto the radar of profiteering hackers, mental stages: endpoint security, cyber-
emerge: How does the factory avoid providing channels to invade systems security, and security management.
obstructing OT control data transmis- or disrupt operations. With cyberat- To enhance OT data security capabil-
sion with the addition of IT data? tacks becoming common, data se- ity, industrial firms should:
Why is this a concern? It is because curity and cybersecurity are emerg- • Apply intrusion protection system
industrial Ethernet networks, the most- ing as required items on every digital (IPS) technology to OT automation
used industrial networks, do not have transformation agenda. To safeguard devices to secure critical infrastruc-
real-time control mechanisms for mass production capacity and keep produc- ture. An industrial-grade IPS moni-
data. The proposed solution has been tion lines safe from data-tampering at- tors data flowing in and out of critical
to have two separate networks for send- tempts, companies must pay attention devices, segregates malicious traffic,
ing images and control commands. The to OT data security. and notifies administrators the instant
advantage is the two streams of data do an anomaly is detected.
not compete for network bandwidth; the • Take advantage of network layering
disadvantage is the cost of network im-
Time-sensitive networking to curb ransomware attacks. Firms
plementation and maintenance doubles. (TSN), the new-generation will benefit from upgrading their
Time-sensitive networking (TSN), the Ethernet switches to managed Ether-
new-generation Ethernet, is designed to
Ethernet, is designed to net switches and activating the layer-
schedule transmissions according to the schedule transmissions ing feature to divide an OT network
importance of the data, ensuring impor- into segments.
tant data reaches the device at the sched-
according to the importance • Use network management software to
uled time. This is what robust OT data of the data, ensuring overcome the interoperability hurdles
transmission capability entails. among various OT communication
In addition, environmental distur-
important data reaches protocols to effectively spot faulty or
bances, such as extreme temperatures the device at the sched- risky devices via visualization.
or electromagnetic waves generated
during the startup of a device, can
uled time. This is what Use the four OT data capabilities
cause network disruptions and the po- robust OT data transmis- As the old saying goes, do not put the
tential for data to be lost. Contingency cart before the horse. It is critical to
plans should be made for all kinds of
sion capability entails. get your priorities straight in industrial
incidents to avoid losing data in transit digital transformation. Do not let poor-
during disturbances. A misconception among businesses quality raw data undermine the results
As an illustration, when a wired or is that mature IT security solutions of your big data analyses.
wireless network is down, the network can be directly replicated in the OT Before trying to source OT data, con-
backup mechanism can immediately world. In reality, security tools meant sider where you are in terms of data ac-
activate another section to resume for IT environments are not entirely quisition, data preparation, data trans-
transmission. Or, when the network is fit for OT system protection. For ex- mission, and data security. Armed with
temporarily congested or disconnect- ample, because OT devices do not run these four capabilities, you will be able
ed, a certain amount of the latest data the operating systems compatible with to tackle the challenges head on and
can be stored locally to ensure the data, antivirus software, installing it on OT leverage high-quality OT data to lay a
if lost, will be retransmitted or retrieved systems is out of the question. Further solid foundation for transformation. n
to avoid delivering fragmented data. complicating the antivirus situation is
the importance of capacity availability
Challenge: Vulnerable data in OT environments; the fear that pro- ABOUT THE AUTHOR
OT data becomes not trustworthy duction capacity will be hurt by data Oliver Wang
mostly from cybersecurity issues. In packets being wrongfully blocked has ( w w w. l i n k e d i n .
the past, OT systems did not need to kept many machines away from anti- c o m / i n / o l i v e r-
be Internet connected and could be virus software solutions. wang-6873a329)
protected simply through physical Another OT data security issue is the is product mar-
controls, such as limiting access to an fact that many manufacturers have de- keting manager,
operational area or banning the use of ployed all devices on the same intranet edge connectivity
USB sticks and personal computers. As for the sake of connection stability and and computing, for
industrial digital transformation takes convenience. However, once ransom- Moxa, where he has worked for more
off, Internet access becomes essential. ware breaks into that environment, it than 15 years. Wang has a degree from
With increased connectivity, all vul- can easily spread throughout the entire the University of California, Berkeley.
nerabilities are suddenly laid bare to system. It is thus recommended to se- Access Moxa’s library of white papers at
ruthless computer viruses or thrust cure OT environments in three incre- https://moxa.com/en/case-studies.

WWW.ISA.ORG INTECH DECEMBER 2021 27


A worksheet that calculates control valve
installed gain can be part of any control valve
selection process.

F
By Jon F. Monsen, or many years, the author has used, This article explains how to use control valve in-
PhD, PE and promoted the use of, control valve stalled gain calculations.
installed flow and gain graphs as part Figure 1 is an example of a properly sized valve
of the control valve selection process (references compared to an oversized valve. One valve man-
1–3). For all those years, the author has had the ufacturer suggests the following gain criteria for
benefit of being associated with a valve manu- installed gain within the specified flow range:
facturer with a publicly available control valve- • Gain > 0.5
sizing application that included installed flow • Gain < 3.0
and gain graphing capability. Users who pre- • As constant as possible
ferred other brands of control valves, and thus • As close to 1.0 as possible
those manufacturers’ control valve-sizing applica- • Gain (max) / Gain (min) < 2.0.
tions, were hesitant to learn to use a new applica- Extremely low gains are undesirable, because
tion to take advantage of the graphing capability. a low gain means when the valve moves, the
Recently, the author published an article that flow does not change by much. It might not be
included detailed instructions for constructing a as obvious why high gains are undesirable. An
Microsoft Excel worksheet (www.control-valve- audio amplifier with a high gain may be desir-
application-tools.com) that generates installed able. But control valves are mechanical devices,
flow and gain graphs in conjunction with valve- and parts that move while in contact with each
sizing calculations made with any valve-sizing other tend to stick when not moving. If a valve,
application. This makes it practical for anyone because it tends to stick when not moving, can
to incorporate graphing installed flow and gain only be positioned within 2 percent of the desired
into their valve selection process (reference 4). position and has a gain of 4, the flow can only

28 INTECH DECEMBER 2021 WWW.ISA.ORG

You might also like