Page 291 - Electric Drives and Electromechanical Systems
P. 291

288   Electric Drives and Electromechanical Systems


                considered, together with disabling any AutoRun feature to prevent inadvertent
                installation of unauthorised software on to the network inside the firewall.
               Anti-virus software should be considered a core requirement but must be updated
                on a regular interval. In addition, all incoming emails and attachments should be
                scanned for malware or other security problems.
               All computer operating systems and applications should be updated with latest
                security patch provided by original equipment manufactuer or software provider.
                As highlighted in Table 11.3, this may prove to be not possible on all systems, in
                these cases extra provision against the introduction of viruses or other software
                problems should be considered as a priority.

                Due to the widespread use of networks considerable thought should be given to the
             firewall protection required. Firewalls establish a barrier between secured and controlled
             internal networks that can be trusted and any external networks. In practice a firewall is
             a network security device or software package that monitors the network traffic and
             decides whether to allow or block specific traffic based on a defined set of security rules.
             The underlying principle are based around the definitions provided by the TCP/IP
             model. For example, the firewall could reject a message packet if it does not conform to
             certain predetermined parameters, for example its senders address is on a black list or
             contains the signature of a piece of malware. Again, the system must be updated on
             a regular basic to ensure the latest virus or threat can be contained.
                Maintaining the security of any system is a continual process (and cost) as attackers
             will have the resources (people or money) to discover new vulnerabilities. These at-
             tackers will go on to develop bespoke tools and techniques to exploit any vunerability
             howver minor; such vulnerabilities enable them to bypass the basic security controls as
             mentioned above. To protect against these bespoke attacks will organisations will need
             to invest in a more holistic approach to security, such as that outlined in the 10 Steps to
             Cyber Security (GCHQ, 2016).


             11.6 Concluding comments

             This chapter concludes the examination of the application of modern drive systems to
             machine-tool and robotic systems. This brief examination of controllers and the
             advantages presented by networking and the Industry 4.0 approach should give
             designers an appreciation of the considerable computational power which is available in
             modern systems. However, irrespective of the controller and the drive, the overall
             performance of a system is as only as good as the weakest link in the chain, the best AI
             based system cannot overcome the selection of an undersized drive that is not capable of
             accelerating a load at the required specification. Designers therefore must have a clear
             understanding of the performance specification prior to entering the design and
             development process. In certain aspects, the controller is the key element, because it
             provides a direct interface with the user; topics such as user interfaces have not been
             considered here, but they do need to be reviewed as part of any design process.
   286   287   288   289   290   291   292   293   294   295   296