One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 250696
Date de publication 2016-11-09 04:59:00 (vue: 2016-11-09 04:59:00)
Titre Robots present a cyber risk
Texte The prospect of an army of robots marching in unison to launch an attack on an unsuspecting city belongs in the realm of science fiction-as do most images of menacing autonomous machines wreaking all kinds of havoc on civilization.That's not to say robotics is free from security and safety threats, however. In fact, experts say the growing use of robots by companies such as manufacturers, retailers, healthcare institutions and other businesses can present a number of cyber risks.There are two primary issues related to security and robotics, says Michael Overly, a partner and information security attorney at law firm Foley & Lardner.First, these machines are generally integral to assembly line operations and other similar activities, Overly says. “An attack could literally bring a manufacturing or assembly plant to its knees,” he says. “We have seen this very outcome in a ransomware attack targeted at robotic assemblers in a plant in Mexico.” In that case, the ransomware locked up the specifications files from which the robots drew their operating parameters, he says.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat activities all are army article assemblers assembly attack attorney autonomous belongs bring businesses can case city civilization click comment companies could cyber drew experts fact fiction files firm first foley free from full generally growing have havoc healthcare here however images information institutions integral issues its kinds knees lardner launch law leave line literally locked machines manufacturers manufacturing marching menacing mexico michael most not number operating operations other outcome overly parameters partner plant please present primary prospect ransomware read realm related retailers risk risks robotic robotics robots safety say says science security seen similar specifications such targeted that these threats two unison unsuspecting use very which wreaking ” “an “we
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: