banner
News
home /News /

How RFID Can Solve Cybersecurity Issues in Industry

How RFID Can Solve Cybersecurity Issues in Industry

2022-08-05
Cybersecurity has been a topic facing automation processes since factories moved to Ethernet.

Most industrial cybersecurity discussions focus on ways to combine networks and software to segment and secure critical production operations and systems.

Physical access to the system is sometimes overlooked in these cybersecurity discussions. User authentication is an aspect of secure system access through which authorization data can be used to determine whether employees have the appropriate skills, and are trained and certified to access manufacturing system hardware and software.

These authorized personnel typically include "plant engineers, maintenance electricians, and IT personnel with access to process-specific software," explained Chris Randle, vice president of industry solutions at RFID read-write technology provider Elatec.

Among these personnel, the level of access for each individual varies according to the individual's function. Engineers typically have full access to upload, download, and change controller and HMI software. IT staff generally only have upload or download authorization for backup and disaster recovery purposes. Service electricians often have limited access to change software and only process troubleshooting. The exact authorization may vary from plant to plant, but to identify who accessed the software and made changes when, these changes can be tracked in a database for review if necessary.

The use of RFID cards can add an extra layer of security to factories and is already one of the most widely used forms of authentication and access control.

Randall said: "Today's industrial automation applications in factories require software for authorization and authentication that is easy to use, flexible, durable, secure, and adaptable to environmental changes. RFID card systems are more efficient than magnetic stripe cards and smart cards. (Built-in embedded chip) and PIN code can better meet these application requirements.”

RFID cards are contactless and can be read by the user simply swiping the card within a few inches of the reader. This authentication and access control of RFID is a very simple step for the user.

leave a message Leave a message
If you have any questions, please leave the message, we will reply you soon.