Nav: Home

Greater readiness repels cyber threats to manufacturers

December 14, 2016

Together with the National Emergency Supply Agency and the private sector, VTT Technical Research Centre of Finland has developed tailored solutions bringing improved cyber security and disruption-free operations to manufacturers. The results of the now ending KYBER-TEO project will make companies more able to ward off possible cyber threats.

A breach of cyber security could easily cause millions of euros of damage in terms of lost production alone. In addition, damaged equipment, environmental contamination and personal injuries could occur. At worst, the problem could affect the whole of society.

The testing and project results of the KYBER-TEO project (2014-2016), led by VTT Technical Research Centre of Finland, have improved the ability of manufacturers to e.g. purchase cyber-secure automation systems and develop their own concepts, instructions and practices for ensuring cyber security and operational continuity.

"In the case of every company, the cyber security of the tested systems was developed even further and in a better direction," says Principal Scientist, Pasi Ahonen of VTT. "Hopefully, the companies have also learned how to identify information security vulnerabilities or gaps in their systems."

For example, VTT's closed Cyber War room helped participants to develop managed, authentic cyber security testing, as well as cyber training which they can pass onto customers. Such training includes exploring the attitudes of cyber attackers, and identifying and repulsing attacks.

The National Emergency Supply Agency, which is the main customer of the overall project, aims to develop cyber security for automation, particularly from the perspective of security of supply in Finland.

"Various types of automation are being implemented at an accelerating pace within a range of environments which are critical to security of supply, from manufacturing to transport and housing," says Sauli Savisalo, a Director at the National Emergency Supply Agency. "Broad-based development of the security of automation is critically important."

As part of the overall project, a small-scale, online cooperation forum on automation-system cyber security was developed. Such a forum would be desirable as a way of deepening confidential communication in the future.

Service companies can now provide manufacturers with more-tailored cyber security services. The results may also support the activities of the organisations covered by the security of supply principle.

The industrial pioneers and cyber security service providers participating in the overall project can seek further support, when necessary, from e.g. The National Cyber Security Centre Finland of the Finnish Communications Regulatory Authority (FICORA).

The participating companies included e.g. Nordic LAN&WAN Communication Oy, Prosys PMS Ltd, Nixu Corporation, Insta DefSec Oy, Schneider Electric Finland Oy and Neste Oyj.

Manufacturers can defend themselves against cyber attacks as follows

Defence against cyber attacks requires e.g.:
  • Greater awareness and training of employees in relation to cyber security
  • Clear internal guidelines and policies
  • Taking account of cyber security during the automation system procurement stage, by e.g. presenting the related requirements
  • Monitoring the status of the automation network
  • Defining and implementing secure remote-access concepts
  • Defining and implementing a secure network architecture
  • Cyber security testing of automation systems (particularly system vendors)
Further information:

Pasi Ahonen, Project Manager, Principal Scientist
Tel. +358 44 730 7152

National Emergency Supply Agency
Sauli Savisalo, Director of Infrastructure Department
Tel. +358 400 473 155

Further information on VTT:

Olli Ernvall
Senior Vice President, Communications
358 20 722 6747

VTT Technical Research Centre of Finland Ltd is the leading research and technology company in the Nordic countries. We use our research and knowledge to provide expert services for our domestic and international customers and partners, and for both private and public sectors. We use 4,000,000 hours of brainpower a year to develop new technological solutions. VTT in social media: Facebook, LinkedIn, YouTube and Twitter @VTTFinland.

VTT Technical Research Centre of Finland

Related Cyber Security Articles:

First cyber agility framework to train officials developed to out-maneuver cyber attacks
To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the US Army, scientists at The University of Texas at San Antonio, developed the first framework to score the agility of cyber attackers and defenders.
Cyber of the fittest: Researchers develop first cyber agility framework to measure attacks
The framework proposed by the researchers will help government and industry organizations visualize how well they out-maneuver attacks over time.
Photons trained for optical fibre obstacle course will deliver stronger cyber security
Researchers from the NUS-Singtel Cyber Security Research & Development Laboratory demonstrate a way to improve quantum key distribution over fiber networks.
At least 57 negative impacts from cyber-attacks
Cyber-security researchers have identified a total of at least 57 different ways in which cyber-attacks can have a negative impact on individuals, businesses and even nations, ranging from threats to life, causing depression, regulatory fines or disrupting daily activities
UBC study: Publicizing a firm's security levels may strengthen security over time
New research from the UBC Sauder School of Business has quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.
Improving cyber security in harsh environments
Many people don't worry about the security of their personal information until it's too late.
Approach enables experts to look beyond IP in cyber security investigations
A technique which enables digital forensic investigators to assess an individual's internet use rather than simply focusing on traffic through Internet Protocol (IP) addresses has been developed by cyber security experts at the University of Plymouth and is outlined in a study published in the September 2017 issue of Computers & Security.
Smart electrical grids more vulnerable to cyber attacks
Electricity distribution systems in the USA are gradually being modernized and transposed to smart grids, which make use of two-way communication and computer processing.
Cyber attacks can threaten public health
Gordon and Landman have authored a Perspective piece in the New England Journal of Medicine that addresses the growing threat of attacks on information systems and the potential implications on public health.
Under cyber attack: UH researchers look at how to catch a 'phisher'
As cybersecurity experts scramble to stop another wave of ransomware and malware scams that have infected computers around the world, computer science experts at the University of Houston are 'phishing' for reasons why these types of attacks are so successful.
More Cyber Security News and Cyber Security Current Events

Best Science Podcasts 2019

We have hand picked the best science podcasts for 2019. Sit back and enjoy new science podcasts updated daily from your favorite science news services and scientists.
Now Playing: TED Radio Hour

Rethinking Anger
Anger is universal and complex: it can be quiet, festering, justified, vengeful, and destructive. This hour, TED speakers explore the many sides of anger, why we need it, and who's allowed to feel it. Guests include psychologists Ryan Martin and Russell Kolts, writer Soraya Chemaly, former talk radio host Lisa Fritsch, and business professor Dan Moshavi.
Now Playing: Science for the People

#538 Nobels and Astrophysics
This week we start with this year's physics Nobel Prize awarded to Jim Peebles, Michel Mayor, and Didier Queloz and finish with a discussion of the Nobel Prizes as a way to award and highlight important science. Are they still relevant? When science breakthroughs are built on the backs of hundreds -- and sometimes thousands -- of people's hard work, how do you pick just three to highlight? Join host Rachelle Saunders and astrophysicist, author, and science communicator Ethan Siegel for their chat about astrophysics and Nobel Prizes.