Chapter 7
Cybersecurity
Copyright © 2019 Eaton Corporation. All Rights Reserved.
IPN March 2019
132
Cybersecurity
Overview
Connected devices and the vast amounts of data they generate create opportunities as well as
risks: from manufacturing and testing to installation and service.
A security breach can result in operational downtime and/or data loss, as well as impact safety,
lifecycle costs and your reputation — any one of which can seriously impact customer loyalty
and your bottom line.
Eaton provide the following guidance and recommendations in order to help protect against
cyber related attacks and system breaches.
Topic
Page
Asset identification and configuration
Restrict Physical access
System Access Controls
Secure Network Access
Remote Access
Logging and Event Management
3rd Party / COTS Security
Decommissioning or Zeroisation
Содержание EFX48 e-Fuse Series
Страница 9: ......
Страница 50: ......
Страница 54: ......
Страница 88: ......
Страница 103: ...EFX48 e Fuse System Operation Copyright 2019 Eaton Corporation All Rights Reserved IPN March 2019 103...
Страница 156: ...Appendix D Menu Map Copyright 2019 Eaton Corporation All Rights Reserved IPN March 2019 156 Menu Map...
Страница 157: ...Menu Map Copyright 2019 Eaton Corporation All Rights Reserved IPN March 2019 157...