● Worldwide remote access to plants, machines and mobile applications
● The "Internet of things"
Millions of electronic devices are becoming network-capable and are communicating via
the Internet, such as onboard computers in cars, which send warranty information to
dealers, or water meter sensors that transmit water consumption data to municipal water
suppliers via radio.
However, in order for everything from cloud computing to sensors to work without service
disruptions, you need reliable network infrastructures that are well protected against attacks
from malware and hackers.
2.2.2
Possible corporate security holes
Possible security holes or weak points
The security chain of a company is only as strong as its weakest link. Security holes can exist
at numerous points. The following list gives only a few examples:
● Employees
● Production plants
● Network infrastructure
● Data centers
● PC workstations
● Laptops
● Tablet PCs
● Printers
● Smartphones
● Portable storage media
● Guidelines and regulations
For this reason, a holistic approach is required to deal with the issue of security. Coordinated
guidelines and regulations are required that cover all areas: Devices, systems, processes and
employees.
Industrial security
2.2 Why is industrial security so important?
SIMOTION P320-4 E / P320-4 S
Manual, 03/2018, A5E36004933B
25