[SystemSafety] Safety and effective or not cybersecurity countermeasures (was: IEC 63069, and Cybersecurity in IEC 61508)

Robert P. Schaefer rps at mit.edu
Wed Jun 5 14:11:24 CEST 2019


use a private (detached from the Internet) network that is regularly monitored

any/all updates/changes to this private network should be vetted through an intermediate machine that itself
 is only, when necessary, attached/de-attached to the public network, and regulary cleaned/erased/rebuilt and monitored. 

don’t forget to train the humans who come into contact with tne network and the interface

> On Jun 5, 2019, at 6:14 AM, Peter Bernard Ladkin <ladkin at causalis.com> wrote:
> 
> 
> 
> On 2019-06-04 22:00 , David MENTRÉ wrote:
>> 
>> Taking as example an software based railway interlocking control device with some networking
>> function. If one cannot assume that through appropriate countermeasures the device is immune to
>> network attacks, then the attacker could probably in the worst case overwrite the original control
>> software and do anything with the device, including producing unsafe outputs like triggering train
>> collision.
>> 
> Say you are a system integrator, and you have to buy and install such a device. What would you do,
> concretely?
> 
> PBL
> 
> Prof. Peter Bernard Ladkin, Bielefeld, Germany
> MoreInCommon
> Je suis Charlie
> Tel+msg +49 (0)521 880 7319  www.rvs-bi.de
> 
> 
> 
> 
> 
> _______________________________________________
> The System Safety Mailing List
> systemsafety at TechFak.Uni-Bielefeld.DE
> Manage your subscription: https://lists.techfak.uni-bielefeld.de/mailman/listinfo/systemsafety



More information about the systemsafety mailing list