Approach and methods to prevent malicious acts GTR EN Software safety

Cyber-security of  industrial installation and Internet Industrial of Objects (IIoT)
 

THEMATICS

Cyber-security and Software dependability

TITLE

Cyber-security of  industrial installation and Internet Industrial of Objects (IIoT)  

Animators

Jean-Maris FLAUS (Université Joseph Fourier de Grenoble)

 

 

Cybersecurity of industrial plants, of cyber-physical systems and more generally of IIoT (Industrial IoT) is an up to date problematics.

 It is at first a problem due to technological evolution of plants: the plants include more and more connected objects reachable through Internet. The well spread idea of an industrial computer installation which can be operated stand alone far from cyber threats is now bygone.

The regulation evolution such as LPM2013 (loi de programmation militaire) gives new rules face to Internet. As far as Vital Importance Operators (OVI)are concerned, public authorities ask companies to implement  precise steps to master cyber-security along with the risk of heavy fines in case of  non compliance.

 Finally due to evolution of actors of cybercrime, who realized the potential of cyberattacks and implement huge means in this field. The era of fiddler hacker belongs to the past and  most of the computer malevolence is nowadays motivated by money. This evolution of crime lets a new vulnerability appear, linked to internal actors of the company who access to sensible resources. This reinforces the need of a global approach to master the cyber-risk taking into account the human factor.

This approach has to be specific. In fact, systems of industrial computers are different of systems of classical computers, such as, for instance:

 

  • An attack impact can be not only financial(production loss or quality)but can also concern the environment or population health
  • The cyber-physical systems are real time by nature, and a solution  consisting for instance to stop the computer cannot be applied, because the process itself, out of computer control can be dangerous
  • The equipment can be ancient, before the era of cyber-attack and hence be vulnerable

Face to the threat concerning system security, companies have first to realize the  risk and adopt methodologies and tools to evaluate it. When the risk is not acceptable any longer, adapted and pertinent measures have to be implemented.

 

  • l’impact d’une attaque peut non seulement être financier (perte de production ou de qualité), mais peut également concerner l’environnement ou la santé des populations

To accomplish these tasks, approaches have been proposed, by example by ANSSI, and a few technical solutions exist, but the topic is still ill masterized. It remains difficult to know which approach adopt, to determine the necessary means and to determine their pertinence in a given context. The approach articulation related to company risk management, namely relative to computer security is also a major issue.

 

OBJECTIVE

The WG objective is to organize the existing knowledge, to evaluate it face to actual stresses and feedback experience, and to let emerge blocking points, being technical, human or organizational.

The WG aims to allow actors concerned by cyber-security of industrial plants and IIoT to share knowledge and experience. Evaluation actions of existing solutions as well as technical and statutory watch can be implemented. Guides and working days of sensitization could be realized. The group also aims at meeting other bodies or associations to place  its problematics relative to global cyber security and let emerge methodologic development and research questions.

 

Retour