Inst ToolsInst ToolsInst Tools
  • Courses
  • Automation
    • PLC
    • Control System
    • Safety System
    • Communication
    • Fire & Gas System
  • Instrumentation
    • Design
    • Pressure
    • Temperature
    • Flow
    • Level
    • Vibration
    • Analyzer
    • Control Valve
    • Switch
    • Calibration
    • Erection & Commissioning
  • Interview
    • Instrumentation
    • Electrical
    • Electronics
    • Practical
  • Q&A
    • Instrumentation
    • Control System
    • Electrical
    • Electronics
    • Analog Electronics
    • Digital Electronics
    • Power Electronics
    • Microprocessor
  • Request
Search
  • Books
  • Software
  • Projects
  • Process
  • Tools
  • Basics
  • Formula
  • Power Plant
  • Root Cause Analysis
  • Electrical Basics
  • Animation
  • Standards
  • 4-20 mA Course
  • Siemens PLC Course
Reading: Cybersecurity in PLC
Share
Font ResizerAa
Inst ToolsInst Tools
Font ResizerAa
  • Courses
  • Design
  • PLC
  • Interview
  • Control System
Search
  • Courses
  • Automation
    • PLC
    • Control System
    • Safety System
    • Communication
    • Fire & Gas System
  • Instrumentation
    • Design
    • Pressure
    • Temperature
    • Flow
    • Level
    • Vibration
    • Analyzer
    • Control Valve
    • Switch
    • Calibration
    • Erection & Commissioning
  • Interview
    • Instrumentation
    • Electrical
    • Electronics
    • Practical
  • Q&A
    • Instrumentation
    • Control System
    • Electrical
    • Electronics
    • Analog Electronics
    • Digital Electronics
    • Power Electronics
    • Microprocessor
  • Request
Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Inst Tools > Blog > PLC Tutorials > Cybersecurity in PLC

Cybersecurity in PLC

In this post, we will see the concept of cyber-security in PLC (programmable logic controllers) in industrial automation systems.

Last updated: May 28, 2024 3:28 pm
Viral Nagda
PLC Tutorials
1 Comment
Share
6 Min Read
SHARE

In this post, we will see the concept of cybersecurity in PLC (programmable logic controllers) in industrial automation systems.

Contents
CybersecurityPlant Network in a PLC SystemTypes of Security in a PLC system

Cybersecurity

Cybersecurity in PLC

In a large automation environment, due to the use of abundant and complex network systems, it is important to protect these systems from cyber prone attacks.

Any leakage in data or snag in hardware can affect these networks to be more vulnerable to attacks.

Unauthorized attacks can lead to permanent damage to the system or theft of data.

Due to all these reasons, cyber-security has now become the main factor in deciding the selection of a PLC in a large network system.

Plant Network in a PLC System

Typically, a network system in industrial automation consists of three layers as shown in the figure.

Plant network in a PLC System

The first layer of the field network is the local IO’s in a field and its local PLC.

The second layer of the process network is the layer of many central PLCs, controlling their corresponding local remote PLCs.

The process layer can have a different range of PLCs. Like, one can be a PLC of Schneider make or the other can be a Siemens make.

The last layer of the plant network is a layer of a centralized SCADA system or Historian PC, controlling the whole plant operation.

Due to large network connectivity at the plant layer, this system is more prone to attacks than a process layer or field layer. This does not mean that these two layers can be given less security.

If the hacker finds out about the leak in this design, he can partially damage the system too by this.

So, overall, each and every device must have protection programs configured in it, to prevent it from hacking. It is just a matter of theory and practice that more layers of protection must be applied to the plant layer.

Types of Security in a PLC system

There are two types of security in a PLC system

  1. Windows and
  2. In-Built.

In a Windows PC having software installed in it, one can enforce security in it like disabling an unused network connection, disabling USB ports; which will require only an IT person of the concerned company to unlock it.

Now, the most widely and simple used network connection is a LAN connection. Some of the steps in making a LAN connection secured are disabling all IPv6 stacks, deselecting all LAN properties except QoS Packet Scheduler and IPv4, deselecting LMHOSTS and NetBIOS over TCPIP, etc.

You can also disable remote access connection in windows settings. Microsoft LAN Manager Protocol (LANMAN or MN) and its successor NT LAN Manager (NTLM) have many vulnerabilities in their usage. So, it is also recommended to disabling them.

Generally, in a PLC communication settings tool for LAN connection, there are some standard services like Subnet, FTP, TFTP, HTTP, Port 502, EIP, and SNMP available. All these are used for controlling access to a network.

Accordingly, you need to enable or disable them so that any unauthorized person cannot access the PLC system.

Also, a general rule is to set the network addresses properly and in a certain predefined range. Giving a wider range of addresses by mistake is a big blunder, as this invites other people to access the network.

A basic rule in securing a connection is establishing a strong password. Always enter a password that is not identical and does not relate to anything in the company or the person or the manufacturer. Share it with only the higher-level employees of the plant and ensure that it is not leaked.

Choose a PLC that has CSPN (Certification de Securite de Premier Niveau) certification. It can withstand a cyber-attack driven by 2mmth of skilled hackers. It employs the highest level of secure connections and features that are possible in a PLC, with a wide range of protections.

Like 21CFR compliance used in pharmaceutical industries, PLCs to have their internal event logging or cybersecurity audit for tracking and analyzing connections done. You can exchange these internal events on a network and track them continuously.

These are some of the general features available in a PLC. Different PLCs have different levels of security enhancements.

CyberSecurity Course for Beginners (Electrical and Instrumentation Automation)

If you liked this article, then please subscribe to our YouTube Channel for Instrumentation, Electrical, PLC, and SCADA video tutorials.

You can also follow us on Facebook and Twitter to receive daily updates.

Read Next:

  • PLC, DCS Marshalling Cabinet Checks
  • Yokogawa DCS System Maintenance
  • Configuration of Analog Input in DCS
  • Instrumentation Cyber Security Glossary
  • Voice Activated Automation Systems
Don't Miss Our Updates
Be the first to get exclusive content straight to your email.
We promise not to spam you. You can unsubscribe at any time.
Invalid email address
You've successfully subscribed !

Continue Reading

What is a PLC? – Programmable Logic Controller
PLC Program for Alarm Indication in Process Control
Machine Tool and Coolant Control: PLC Ladder Logic Design
How to Design a Motor Faceplate in Graphics? – SCADA Tutorials
PLC Program for Automatic Lamp Control in Storage Facility
Advanced PLC Conveyor Control: Forward and Reverse Rotation
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link
Share
1 Comment
  • Taeyoung Kim says:
    January 13, 2023 at 4:58 pm

    Hi Viral, thanks for this. It was a really useful read.

    I’m working for an authentication company, and we’re currently developing (actually we’ve developed) an IAM solution for PLC devices.

    In fact, we’re currently doing a PoC with one of the largest PLC manufacturers in the world.

    Frankly speaking, I would like your expertise in the automation industry and learn more about this industry. If you have time, could I please have a quick chat?
    You can email me at [email protected]

    Really looking forward to hearing from you.

    Best Regards,

    TK

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

128.3kFollowersLike
69.1kFollowersFollow
210kSubscribersSubscribe
38kFollowersFollow

Categories

Explore More

PLC Programming for Tank Heating Control using Heater
Product Sticker Machine with Weighing PLC Program
Best Practices of PLC Wiring – Programmable Logic Controller
Industrial Networking and Wireless Interview Questions
Principle of Operation of PLC
Traffic Light Control using PLC Ladder Logic
PLC Programming Examples on Industrial Automation
Types of Digital Outputs in PLC

Keep Learning

Set the S5 timer value by a memory word

Set the S5 Timer Value by a Memory Word

How to program a running hours meter in PLC

Allen Bradley Studio 5000: Motor Running Hours PLC Program

What is Fail-safe in Siemens PLC?

What is Fail-safe in Siemens PLC?

Track PLC Operating Modes

#2 PLC Best Practices – Track Operating Modes

PLC Programming for Train Detection and Gate Operation

PLC Programming for Train Detection and Gate Operation

Functional Block Diagram of XNOR Logic Gate

PLC Functional Block Diagram for Logic Gates

Concept of DCS in Industrial Automation

Concept of DCS in Industrial Automation

Unspecified CPU in Tia Portal

How to Add Unspecified CPU in Tia Portal?

Learn More

Methods of Measurement

Methods of Measurement

Why is Capacitor Used in a Fan

Why is Capacitor Used in a Fan?

Digital Electronics Multiple Choice Questions

Memory Devices Objective Questions – Part 1

PLC Count values higher than 999

PLC Count values higher than 999

Comparators Objective Questions

Comparators Objective Questions

Bubbler Level Measurement System

Bubbler Level Sensor

Cyber Security Multiple Choice Questions and Answers

Cyber Security Multiple Choice Questions and Answers

Python in Industrial Automation

Python in Industrial Automation and Control Systems

Menu

  • About
  • Privacy Policy
  • Copyright

Quick Links

  • Learn PLC
  • Helping Hand
  • Part Time Job

YouTube Subscribe

Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?