The 4th Industrial Revolution

July 2019 Editor's Choice, Cyber Security, Security Services & Risk Management, Industrial (Industry)

When one thinks of the word ‘revolution’, images of armed insurgents attempting to overthrow an incumbent government or system invariably springs to mind. Adding the word ‘industrial’ changes the image to one of technological change. Today, however, the two meanings are becoming increasingly intertwined and the future vision is increasingly worrying.

Craig Rosewarne.
Craig Rosewarne.

A quick preview of preceding revolutions puts things into perspective:

First Revolution – The invention of the steam engine in 1760 powered new manufacturing processes leading to the creation of factories and industry.

Second Revolution – Mass production in new industries such as steel, oil and electricity coupled with key inventions including the telephone, light bulb and internal combustion engine.

Third Revolution – Also known as the ‘Digital Revolution’ after the introduction of the semiconductor, personal computer and Internet.

Fourth Revolution – Due to the fact that our physical, biological and digital world is shrinking rapidly due to rapid advancements in technology, a conflict of interests relating to ideology, supremacy, financial, etc. will occur. Cyber warfare is already taking place and a major attack vector are countrys’ industrial sectors. With every attack comes the need for defence, but are we ready?

Technology: good and bad

Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril. Cyber technology can both help save lives or cause irreparable harm and in a combination of the two, depending on whose side you’re on, both.

Some notable cases of cyberattacks against industry have included:

Stuxnet – In the early 2000s, Iran began to flex its nuclear muscle as it sought to counter the threat that Israel posed by possessing nuclear weapons. A uranium processing plant began enriching uranium at a plant supplied by America in the 1950s, when Iran was still a regional ally. The West and Israel had two options, go to war or allow Iran to complete its plan, which it claimed was for humanitarian purposes. A third proposal was then put forward, the use of cyber technology to destroy or at least delay the enrichment.

The problem was that the plant’s computer systems were air-gapped and only a few key personnel had access to them. The solution was simple, the old Greek Trojan Horse. USBs containing malicious code were left near the cars of the key scientists and sure enough, one was picked up and inserted into his laptop and then transferred to the main system.

The targets were the centrifuges (simply put, giant ‘spin driers’) rotating at 100 000 rpm which extracted purer forms of uranium. Stuxnet caused these centrifuges to speed up without showing it in the control rooms. They eventually tore themselves to pieces, delaying Iran’s plans long enough (along with sanctions) to bring them to the negotiating table.

German blast furnace – In 2014, a German steel mill’s blast furnace was hacked causing the electronic doors not to seal properly. The damage was enormous. This form of attack is known as an Advanced Persistent Threat (APT) where attackers infiltrate the system and gather information over a period of time. When weaknesses are found, they strike.

Ukrainian power grid – This is one of the first major attacks, again using a Trojan, that affected a large portion of the populace in Western Ukraine. This attack has given us a taste of the potential consequences that cyber-attacks can have on industrial sites and the roll-on affect to consumers.

We now have the Industrial Internet of Things (IIoT)

How safe is South Africa’s industrial and critical infrastructure? Sad to say, we are woefully unprepared for any major cyber incident and have thankfully not (yet) been targeted in a major attack. Koeberg, our only nuclear power station, has been around for 35 years and has suffered its fair share of shutdowns and mishaps, mostly due to human negligence and sabotage. Total estimated costs due to outages is around R 2 billion.

Our financial and retail industries have been hit fairly hard recently, but the main motivation here appears to be exfiltration of data and financial gain via ransomware attacks. Attacks against industrial targets are normally carried out by nation states, hacktivists (opposition groups, environmentalists, etc.) or even individuals with an axe to grind. With the outcry surrounding our state capture commission, people in power are turning a blind eye to a far greater threat of a major cyber incident against industrial and critical infrastructure.

What can be done to protect us? According to security group Sentryo, the approach of teams in charge of ICS cyber security must overcome five key constraints:

• Take into account physical processes*.

• Using technology specially designed for industrial environments.

• Mapping installations and analysing risks: an inventory of all material installations, critical systems and applications – this enables us to identify each weakness, the needs as well as the objectives when faced with threats.

• Placing actors, who are often unaware of the risks and thus responsible for a large part of incidents, at the heart of the security process – it is essential to promote rules of good computer hygiene, especially when it comes to access, login details or even the use of a simple USB flash drive.

• Engage actively in intelligence to stay up-to-date with the threats and vulnerabilities that are unique to the ICS sector.

o *Include skills in security and industrial process control.

o Adapt intrusion tests and security assessments for ICS in order to avoid interfering with physical processes.

o Adapt measures for detecting intrusions in order to take into account attacks that target physical processes (for example Stuxnet or CrashOverride). https://www.sentryo.net/specific-challenges-industrial-cybersecurity/)


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Social media and intelligence-led surveillance
July 2019, Leaderware , Editor's Choice, Integrated Solutions, Security Services & Risk Management
Social media has become a major feature of most people’s lives in the last few years and they can be invaluable as a source of information for companies and security organisations.

Read more...
You can’t isolate, so integrate
July 2019, Axis Communications SA , Industrial (Industry), Integrated Solutions
One of the most exciting trends to emerge from the Industry 4.0 revolution is that technologies and hardware that were originally developed for the security market are increasingly being co-opted to enhance organisational productivity.

Read more...
Data protection more challenging
July 2019 , Editor's Choice, IT infrastructure
The number of businesses unable to recover data after an incident nearly doubled from 2016, according to the Global Data Protection Index surveying 2 200 IT decision makers from 18 countries.

Read more...
Four essential cloud security concepts
July 2019 , Cyber Security, IT infrastructure
Security is a critical a component of any cloud environment, but to be effective, it needs to be as agile and dynamic as the cloud infrastructure being protected.

Read more...
Cyber-attacks target operational technology
July 2019 , Editor's Choice, Cyber Security, Industrial (Industry)
Focus on operational technology security increasing as around 74% of OT organisations come under attack in the past year, finds a new Fortinet report.

Read more...
Fear of the unknown
July 2019, Kaspersky Lab , Cyber Security, Security Services & Risk Management
Fear of the unknown: while there’s still interest in cryptocurrencies, just 19% locally understand how they work.

Read more...
The world’s tiniest TPM
July 2019 , IT infrastructure, Industrial (Industry)
The Trusted Computing Group (TCG) launched a new project to create the 'world’s tiniest Trusted Platform Module (TPM)'.

Read more...
Industrial cybersecurity delivers ROI
July 2019, Kaspersky Lab , Industrial (Industry), Cyber Security
Industrial company achieves 368% ROI with Kaspersky Industrial CyberSecurity reveals global research and advisory firm.

Read more...
Ingo Mutinelli moves to IDEMIA
July 2019, Technews Publishing, IDEMIA , Editor's Choice, News
IDEMIA, the security and identity management company has announced that Ingo Mutinelli will be taking on the post of regional sales director for the southern Africa region.

Read more...
Residential Estate Security Conference 2019: Integrating man and machine for effective security and operations
July 2019, Technews Publishing , Editor's Choice, News, Residential Estate (Industry), Conferences & Events
The Residential Estate Security Conference 2019 will delve into how estates and their service providers can better integrate man and machine for more effective security and operations.

Read more...