Remote access, Overview, Devices – BECKHOFF IPC-Security User Manual

Page 26: Software components

Advertising
background image

5. Remote Access

5.1. Overview

This chapter is based on the scenario that a cyber criminal tries to attack the industrial controller from a
remote location, e.g. via the local network. Network connectivity provides a cyber criminal with more ways
to compromise system security. Industrial controllers are getting more and more connected to systems that
reside in other connectivity layers, e.g. visualizations, MES systems or even the Cloud.

5.1.1. Devices

The following table provides an overview about devices that play an important part in this scenario.

Device

Category

Description

IPC/EPC

Industrial Controller

Beckhoff Industrial-/Embedded-
PC

Switch

Networking hardware

Connects devices to the network

Router

Networking hardware

Connects

different

networks

with each other

Firewall

Networking hardware

Protects networks

Modem

Networking hardware

Used for incoming/outgoing di-
alup connections

5.1.2. Software components

The following table provides an overview about software packages that play an important part in this sce-
nario.

26

Advertising