Conference Proceedings
35th APCOM Symposium 2011
Conference Proceedings
35th APCOM Symposium 2011
Publication sale now on, get up to 70% off
Mining Network and the Security Question
Companies all over the world are very sensitive concerning their IT and network security. In most network connected technical installations and machines however, network security is not taken into account to a significant extent: insecure protocols are run, unencrypted information is exchanged freely and even broadcasted wirelessly and networked machines are accessible via insecure file transfer protocol (FTP).What happens in case of malfunctions of such technical installations? Who is responsible? Who can be held liable in case of accidents? The first computer worm for automation systems (STUXNET') (Symantec, 2010) was discovered during 2010.The paper is intended to create sensitivity among decision makers for potential security and resulting safety leaks and points out the current status quo in technical network security. It outlines best practices for secure networking and procedures for remote access and remote software updates on stationary equipment and mobile mining machinery. It describes how to ensure authentic and genuine configurations and software targets and how to ensure secure communication for autonomous and remote controlled equipment. For such equipment in particular, the following statement should apply: There is no safety without network security'.
Contributor(s):
C Muller, A Noack, A Huebner
-
Mining Network and the Security QuestionPDFThis product is exclusive to Digital library subscription
-
Mining Network and the Security QuestionPDFNormal price $22.00Member price from $0.00
Fees above are GST inclusive
PD Hours
Approved activity
- Published: 2011
- PDF Size: 0.094 Mb.
- Unique ID: P201111078