The 4th Industrial Revolution

July 2019 Editor's Choice, Information Security, Security Services & Risk Management, Industrial (Industry)

When one thinks of the word ‘revolution’, images of armed insurgents attempting to overthrow an incumbent government or system invariably springs to mind. Adding the word ‘industrial’ changes the image to one of technological change. Today, however, the two meanings are becoming increasingly intertwined and the future vision is increasingly worrying.

Craig Rosewarne.
Craig Rosewarne.

A quick preview of preceding revolutions puts things into perspective:

First Revolution – The invention of the steam engine in 1760 powered new manufacturing processes leading to the creation of factories and industry.

Second Revolution – Mass production in new industries such as steel, oil and electricity coupled with key inventions including the telephone, light bulb and internal combustion engine.

Third Revolution – Also known as the ‘Digital Revolution’ after the introduction of the semiconductor, personal computer and Internet.

Fourth Revolution – Due to the fact that our physical, biological and digital world is shrinking rapidly due to rapid advancements in technology, a conflict of interests relating to ideology, supremacy, financial, etc. will occur. Cyber warfare is already taking place and a major attack vector are countrys’ industrial sectors. With every attack comes the need for defence, but are we ready?

Technology: good and bad

Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril. Cyber technology can both help save lives or cause irreparable harm and in a combination of the two, depending on whose side you’re on, both.

Some notable cases of cyberattacks against industry have included:

Stuxnet – In the early 2000s, Iran began to flex its nuclear muscle as it sought to counter the threat that Israel posed by possessing nuclear weapons. A uranium processing plant began enriching uranium at a plant supplied by America in the 1950s, when Iran was still a regional ally. The West and Israel had two options, go to war or allow Iran to complete its plan, which it claimed was for humanitarian purposes. A third proposal was then put forward, the use of cyber technology to destroy or at least delay the enrichment.

The problem was that the plant’s computer systems were air-gapped and only a few key personnel had access to them. The solution was simple, the old Greek Trojan Horse. USBs containing malicious code were left near the cars of the key scientists and sure enough, one was picked up and inserted into his laptop and then transferred to the main system.

The targets were the centrifuges (simply put, giant ‘spin driers’) rotating at 100 000 rpm which extracted purer forms of uranium. Stuxnet caused these centrifuges to speed up without showing it in the control rooms. They eventually tore themselves to pieces, delaying Iran’s plans long enough (along with sanctions) to bring them to the negotiating table.

German blast furnace – In 2014, a German steel mill’s blast furnace was hacked causing the electronic doors not to seal properly. The damage was enormous. This form of attack is known as an Advanced Persistent Threat (APT) where attackers infiltrate the system and gather information over a period of time. When weaknesses are found, they strike.

Ukrainian power grid – This is one of the first major attacks, again using a Trojan, that affected a large portion of the populace in Western Ukraine. This attack has given us a taste of the potential consequences that cyber-attacks can have on industrial sites and the roll-on affect to consumers.

We now have the Industrial Internet of Things (IIoT)

How safe is South Africa’s industrial and critical infrastructure? Sad to say, we are woefully unprepared for any major cyber incident and have thankfully not (yet) been targeted in a major attack. Koeberg, our only nuclear power station, has been around for 35 years and has suffered its fair share of shutdowns and mishaps, mostly due to human negligence and sabotage. Total estimated costs due to outages is around R 2 billion.

Our financial and retail industries have been hit fairly hard recently, but the main motivation here appears to be exfiltration of data and financial gain via ransomware attacks. Attacks against industrial targets are normally carried out by nation states, hacktivists (opposition groups, environmentalists, etc.) or even individuals with an axe to grind. With the outcry surrounding our state capture commission, people in power are turning a blind eye to a far greater threat of a major cyber incident against industrial and critical infrastructure.

What can be done to protect us? According to security group Sentryo, the approach of teams in charge of ICS cyber security must overcome five key constraints:

• Take into account physical processes*.

• Using technology specially designed for industrial environments.

• Mapping installations and analysing risks: an inventory of all material installations, critical systems and applications – this enables us to identify each weakness, the needs as well as the objectives when faced with threats.

• Placing actors, who are often unaware of the risks and thus responsible for a large part of incidents, at the heart of the security process – it is essential to promote rules of good computer hygiene, especially when it comes to access, login details or even the use of a simple USB flash drive.

• Engage actively in intelligence to stay up-to-date with the threats and vulnerabilities that are unique to the ICS sector.

o *Include skills in security and industrial process control.

o Adapt intrusion tests and security assessments for ICS in order to avoid interfering with physical processes.

o Adapt measures for detecting intrusions in order to take into account attacks that target physical processes (for example Stuxnet or CrashOverride). https://www.sentryo.net/specific-challenges-industrial-cybersecurity/)



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Boost revenue streams for MNOS
News & Events Security Services & Risk Management Financial (Industry)
ReveNet has introduced its new solution, designed to safeguard and potentially boost revenue streams in an increasingly challenging landscape for MNOS. The new platform combines advanced analytics and is built on trust, transparency, and sustainability principles.

Read more...
Here’s to a SMART 2025
SMART Security Solutions Editor's Choice News & Events
This is the final news brief from SMART Security Solutions for 2024, and the teams would like to take this opportunity to thank our readers, advertisers and partners and wish everyone a safe and secure festive season.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
SA company develops world-first safe K9 training for drug detection
Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...
AI-powered automation for an operational efficiency edge
Editor's Choice AI & Data Analytics IoT & Automation
In the fast-moving world of digital transformation, businesses are under immense pressure to accelerate their operations and adapt quickly to stay competitive in an era dominated by AI and technological advancements.

Read more...
2025 Southern Africa OSPAs entries now open
Technews Publishing Editor's Choice News & Events Training & Education
Entries are now open for the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs). The OSPAs are designed to be both independent and inclusive, providing an opportunity for outstanding performers, to be recognised and their success to be celebrated.

Read more...
Elvey to distribute Tiandy
Elvey Security Technologies Editor's Choice Surveillance News & Events
Tiandy’s presence in South Africa was boosted in November with the announcement that Elvey Security Technologies will distribute a broad range of Tiandy equipment through its channel partners and provide project assistance.

Read more...