Skip to main content
Conference Proceedings

35th APCOM Symposium 2011

Conference Proceedings

35th APCOM Symposium 2011

PDF Add to cart

Mining Network and the Security Question

Companies all over the world are very sensitive concerning their IT and network security. In most network connected technical installations and machines however, network security is not taken into account to a significant extent: insecure protocols are run, unencrypted information is exchanged freely and even broadcasted wirelessly and networked machines are accessible via insecure file transfer protocol (FTP).What happens in case of malfunctions of such technical installations? Who is responsible? Who can be held liable in case of accidents? The first computer worm for automation systems (STUXNET') (Symantec, 2010) was discovered during 2010.The paper is intended to create sensitivity among decision makers for potential security and resulting safety leaks and points out the current status quo in technical network security. It outlines best practices for secure networking and procedures for remote access and remote software updates on stationary equipment and mobile mining machinery. It describes how to ensure authentic and genuine configurations and software targets and how to ensure secure communication for autonomous and remote controlled equipment. For such equipment in particular, the following statement should apply: There is no safety without network security'.
Return to parent product
  • Mining Network and the Security Question
    PDF
    This product is exclusive to Digital library subscription
  • Mining Network and the Security Question
    PDF
    Normal price $22.00
    Member price from $0.00
    Add to cart

    Fees above are GST inclusive

PD Hours
Approved activity
  • Published: 2010
  • PDF Size: 0.094 Mb.
  • Unique ID: P201111078

Our site uses cookies

We use these to improve your browser experience. By continuing to use the website you agree to the use of cookies.