{"id":9978,"date":"2023-07-21T14:49:37","date_gmt":"2023-07-21T12:49:37","guid":{"rendered":"https:\/\/onload.reinhausen.com\/de\/?p=9978"},"modified":"2023-07-21T14:49:37","modified_gmt":"2023-07-21T12:49:37","slug":"artificial-intelligence-cybersecurity-at-the-transformer","status":"publish","type":"post","link":"https:\/\/onload.reinhausen.com\/en\/07-2023\/artificial-intelligence-cybersecurity-at-the-transformer\/","title":{"rendered":"Cybersecurity for transformers"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h3 class=\"wp-block-heading\">Mr. Feyrer, what is cybersecurity?<\/h3>\n\n\n\n<p>IT secu\u00adri\u00adty, infor\u00adma\u00adtion secu\u00adri\u00adty, pro\u00adtec\u00adtion of data and infor\u00adma\u00adtion, avail\u00adabil\u00adi\u00adty, con\u00adfi\u00adden\u00adtial\u00adi\u00adty, integri\u00adty \u2013 this is ini\u00adtial\u00adly very abstract. In con\u00adcrete terms, it can be bro\u00adken down into con\u00adtrol secu\u00adri\u00adty and pro\u00adtec\u00adtion goals which means that our sys\u00adtems must be ready and avail\u00adable for their intend\u00aded pur\u00adpose. Errors in the form of fail\u00adures are easy to detect but these should be avoid\u00aded at all costs by tak\u00ading mea\u00adsures in advance. <\/p>\n\n\n\n<p>In terms of cyber\u00adse\u00adcu\u00adri\u00adty, the pro\u00adtec\u00adtion goals of con\u00adfi\u00adden\u00adtial\u00adi\u00adty and integri\u00adty \u2013 that data must not be acces\u00adsi\u00adble to unau\u00adtho\u00adrized per\u00adsons and must there\u00adfore be con\u00adfi\u00adden\u00adtial \u2013 are more dif\u00adfi\u00adcult to rec\u00adog\u00adnize, but just as impor\u00adtant. If unau\u00adtho\u00adrized changes take place, then the data can no longer be relied upon. Here, too, appro\u00adpri\u00adate pre\u00adcau\u00adtions must be tak\u00aden in advance, but also, if pos\u00adsi\u00adble, rec\u00adog\u00adnized and avert\u00aded dur\u00ading oper\u00ada\u00adtion.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why is high cybersecurity important for transformers?<\/h3>\n\n\n\n<p>Trans\u00adform\u00aders con\u00adsist of many indi\u00advid\u00adual com\u00adpo\u00adnents. The trend is toward more remote con\u00adtrol, and thus more net\u00adwork\u00ading, and thus in turn more attack sur\u00adface that must be secured. In dis\u00adtant regions, remote mon\u00adi\u00adtor\u00ading is faster, eas\u00adi\u00ader and more effec\u00adtive than send\u00ading a tech\u00adni\u00adcian on site. <\/p>\n\n\n\n<p>But this requires secur\u00ading access points and func\u00adtions against unau\u00adtho\u00adrized use, as well as detect\u00ading and defend\u00ading against tech\u00adni\u00adcal attacks. With all things dig\u00adi\u00adtal, cyber\u00adse\u00adcu\u00adri\u00adty pro\u00adtec\u00adtion goals are impor\u00adtant to ensure expect\u00aded func\u00adtions. And, of course, for con\u00adtrol func\u00adtions it is impor\u00adtant to ensure that input val\u00adues and oper\u00adat\u00ading para\u00adme\u00adters are with\u00adin the defined ranges and that devi\u00ada\u00adtions are detect\u00aded \u2013 regard\u00adless of whether they result from errors in oper\u00ada\u00adtion or delib\u00ader\u00adate manip\u00adu\u00adla\u00adtion.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignwide\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<blockquote class=\"wp-block-quote has-text-align-right is-style-large yellow-stripe is-layout-flow wp-block-quote-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/onload.reinhausen.com\/de\/wp-content\/uploads\/sites\/25\/2023\/07\/Hubert-Feyrer-ist-Cybersicherheitexperte-bei-der-Maschinenfabrik-Reinhausen.jpg\" alt class=\"wp-image-10220\" width=\"200\" height=\"200\"><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-right\">\u201cCyber\u00adse\u00adcu\u00adri\u00adty does not only include pro\u00adtec\u00adtion against attacks, but also the reli\u00ada\u00adbil\u00adi\u00adty of the sys\u00adtems.\u201d<\/p>\n<cite>Dr. Hubert Feyr\u00ader<\/cite><\/blockquote>\n<\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">What does cybersecurity look like in product development?<\/h3>\n\n\n\n<p>There are three major areas for pro\u00adtect\u00ading machines from humans, whether through error or tam\u00adper\u00ading: pre\u00adven\u00adtion, detec\u00adtion, response. This means that poten\u00adtial risks are already iden\u00adti\u00adfied dur\u00ading the design stage \u2013 secu\u00adri\u00adty by design \u2013 which are then avoid\u00aded with suit\u00adable mea\u00adsures dur\u00ading devel\u00adop\u00adment, pro\u00adgram\u00adming and pro\u00adduc\u00adtion.<\/p>\n\n\n\n<p>But the life of our prod\u00aducts only begins at the end of pro\u00adduc\u00adtion, and new vul\u00adner\u00ada\u00adbil\u00adi\u00adties must also be iden\u00adti\u00adfied dur\u00ading use by cus\u00adtomers, and any result\u00ading risks must be assessed. If our cus\u00adtomers\u2019 own risks increase in their envi\u00adron\u00adment as a result, it is our respon\u00adsi\u00adbil\u00adi\u00adty to inform them of this and pro\u00advide secu\u00adri\u00adty updates for our prod\u00aducts accord\u00ading\u00adly. This is where the proac\u00adtive pre\u00adven\u00adtion of risks in devel\u00adop\u00adment inter\u00adtwines with the iden\u00adti\u00adfi\u00adca\u00adtion of appro\u00adpri\u00adate respons\u00ades in use by cus\u00adtomers and in our prod\u00aduct main\u00adte\u00adnance.<\/p>\n\n\n\n<p>Internation\u00adal stan\u00addards such as ISO 27001 and IEC 62443 pro\u00advide pro\u00adce\u00addur\u00adal mod\u00adels for this which com\u00adprise plan\u00adning, imple\u00admen\u00adta\u00adtion, review and con\u00adtin\u00adu\u00adous improve\u00adment. And so that you don\u2019t have to start from scratch, there is an exten\u00adsive cat\u00ada\u00adlog of top\u00adics that include pos\u00adsi\u00adble risks and how to deal with them across depart\u00adments. Every\u00adthing must fit so that the chain does not break at its weak\u00adest link.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How well positioned is MR in terms of cybersecurity?<\/h3>\n\n\n\n<p>An infor\u00adma\u00adtion secu\u00adri\u00adty man\u00adage\u00adment sys\u00adtem (ISMS) is cur\u00adrent\u00adly being set up with a focus on ETOS\u00ae and the deliv\u00adery of ETOS\u00ae soft\u00adware updates through our MR cus\u00adtomer por\u00adtal. Along with the devel\u00adop\u00aders, all sup\u00adport\u00ading depart\u00adments are also involved: from IT to HR and from pur\u00adchas\u00ading to the legal depart\u00adment. In the project, the cur\u00adrent sta\u00adtus is being checked by com\u00adpar\u00adi\u00adson with a cat\u00ada\u00adlog of mea\u00adsures spec\u00adi\u00adfied by ISO 27001, and risks are being iden\u00adti\u00adfied and mea\u00adsures derived.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Digitalization of power transformers\u2009\u2014\u2009what challenges and risks does this pose for customers?<\/h3>\n\n\n\n<p>Here is an exam\u00adple: An ETOS\u00ae is con\u00adnect\u00aded to TESSA\u00ae, the MR asset man\u00adage\u00adment plat\u00adform. The nec\u00ades\u00adsary encryp\u00adtion infra\u00adstruc\u00adture is devel\u00adoped and coor\u00addi\u00adnat\u00aded with the depart\u00adments respon\u00adsi\u00adble for the two MR prod\u00aducts at the ends of the con\u00adnec\u00adtion. Secu\u00adri\u00adty in devel\u00adop\u00adment also includes per\u00adform\u00ading inde\u00adpen\u00addent checks in the form of pen\u00ade\u00adtra\u00adtion tests and inde\u00adpen\u00addent audits before deliv\u00adery to cus\u00adtomers. And of course, our prod\u00aducts are also mon\u00adi\u00adtored after deliv\u00adery to iden\u00adti\u00adfy new\u00adly dis\u00adcov\u00adered vul\u00adner\u00ada\u00adbil\u00adi\u00adties ear\u00adly on and enable their reme\u00addi\u00ada\u00adtion through soft\u00adware updates in the MR cus\u00adtomer por\u00adtal.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What does the future hold?<\/h3>\n\n\n\n<p>In addi\u00adtion to all these tech\u00adni\u00adcal and orga\u00adni\u00adza\u00adtion\u00adal issues, there are many legal devel\u00adop\u00adments, as leg\u00adis\u00adla\u00adtors have also rec\u00adog\u00adnized the impor\u00adtance of cyber\u00adse\u00adcu\u00adri\u00adty. One exam\u00adple of this is the upcom\u00ading Cyber Resilience Act which will set EU-wide spec\u00adi\u00adfi\u00adca\u00adtions for prod\u00aducts with dig\u00adi\u00adtal ele\u00adments. Thanks to our prepara\u00adto\u00adry work and many years of expe\u00adri\u00adence, we are well pre\u00adpared here to be able to offer legal\u00adly and tech\u00adni\u00adcal\u00adly secure prod\u00aducts to the mar\u00adket. Of course, we remain con\u00adstant\u00adly on our toes, mon\u00adi\u00adtor\u00ading cur\u00adrent devel\u00adop\u00adments, adapt\u00ading our process\u00ades and train\u00ading all our devel\u00adop\u00aders. Because cyber\u00adse\u00adcu\u00adri\u00adty is a team sport that we must mas\u00adter togeth\u00ader through com\u00admit\u00adment and exper\u00adtise in order to offer our cus\u00adtomers secure prod\u00aducts and ser\u00advices today and in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If high\u00adly sen\u00adsi\u00adtive infor\u00adma\u00adtion falls into the wrong hands, the dam\u00adage can be immense. To pro\u00adtect such infor\u00adma\u00adtion, a tight cyber\u00adse\u00adcu\u00adri\u00adty con\u00adcept is nec\u00ades\u00adsary. This is what Dr. Hubert Feyr\u00ader, who holds a doc\u00adtor\u00adate in com\u00adput\u00ader sci\u00adence, tells us. After teach\u00ading at inter\u00adna\u00adtion\u00adal uni\u00adver\u00adsi\u00adties, he spent ten years at Volk\u00adswa\u00adgen as Chief Infor\u00adma\u00adtion Secu\u00adri\u00adty Offi\u00adcer and is now a cyber\u00adse\u00adcu\u00adri\u00adty expert at Maschi\u00adnen\u00adfab\u00adrik Rein\u00adhausen.<\/p>\n","protected":false},"author":27,"featured_media":10447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"template-cover.php","format":"standard","meta":{"_acf_changed":false,"wp_typography_post_enhancements_disabled":false,"footnotes":""},"categories":[38],"tags":[],"class_list":["post-9978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-07-2023"],"acf":[],"_links":{"self":[{"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/posts\/9978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/comments?post=9978"}],"version-history":[{"count":2,"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/posts\/9978\/revisions"}],"predecessor-version":[{"id":10505,"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/posts\/9978\/revisions\/10505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/media\/10447"}],"wp:attachment":[{"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/media?parent=9978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/categories?post=9978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onload.reinhausen.com\/en\/wp-json\/wp\/v2\/tags?post=9978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}