Cyber Security

“Cyber security is the practice of being against the criminal or unauthorised use of electronic data or measures taken to achieve this.”(What Is Cybersecurity | Types and Threats Defined | Cybersecurity | CompTIA, no date) 

 

Cybersecurity is a part of IT security, along with physical safety and information security, and has different assets to protect. People, processes and technology all play equally important roles in keeping information safe.

Cybersecurity can be categorised into five distinct types: critical infrastructure security, application security, network security, cloud security, and Internet of Things security.

IT professionals should encourage staff to pay attention to URLs and emails and to guard personal information. Password idleness is another common cybersecurity threat. Educate employees about the importance of frequently changing passwords, using solid combinations, and keeping their personally identifiable information to themselves. Emphasise the importance of backing up their data regularly, updating their system's anti-virus, and locking their devices when not in use. (What Is Cybersecurity | Types and Threats Defined | Cybersecurity | CompTIA, no date) 

 

Mike Bastian, Global Controls Manager of Ford Powertrain, described how Ford's manufacturing technology journey started in late 2013 and how cyber security was essential to protect the increasingly large amount of technology deployed in automation and control systems.

One of the first tasks required was developing an inventory of installed, processor-based systems. This took a year to accomplish but defined the scope of issues and allowed the team to create a plan for every computer and processor-based control.

Bastian emphasised that IT cyber security policy must apply to industrial control systems and that Ford's auditors applied IT policy to industrial control systems and uncovered several infractions and violations. This helped this activity gain momentum for good reasons.

Ford realised they needed to align their computer policies to encompass all computers, including IT, manufacturing systems, and industrial automation. They developed a comprehensive, 150-page IT policy manual named the Information Security Policy. They have defined a computer standard for control and automation, including a standard software template, standard disaster recovery package, and classic virus malware protection suite. Derivatives were not allowed anywhere, including with second and third-tier suppliers. 

Mike Bastian believes Ford Powertrain has a solid foundation for the continued implementation of Industry 4.0 and IoT technologies, including intelligent sensors, autonomous manufacturing, and cyber-physical systems. (Cybersecurity Strategy at Ford: IT & Automation Cooperation, no date)

 

Ford Motor Company has been recognised as one of the World's Most Ethical Companies for the eighth year by the Ethisphere Institute

 

Ford has been chosen as the World’s ethical company, eight years in a row, and because they are focused on being a good corporate citizen. 

Their ethical commitment has been shown and highlighted in their programs that monitor and follow strictly human rights and working safely at work conditions. 

 

Ethisphere's list of the World's Most Ethical Companies acknowledges and honours companies that recognise their societal role in influencing or driving a positive change. Several third-party organisations have recognised Ford for its efforts. 

 

(Corporate Responsibility Puts Ford Among World’s Most Ethical Companies for Eighth Straight Year | Ford Media Center, no date) 

 

Businesses such as Ford Automobile, governments and individuals store many data on computers, networks, and the cloud. A data breach can be devastating in various ways, but a multi-layered cybersecurity approach is the best way to protect your information.

 

Ford has a connected vehicle cyber security team that works with industry forums to address complicated technical issues.

In my research, I have discovered that Volkswagen Polo's infotainment unit was vulnerable to cyber-attack. The vulnerability could hold a wealth of personal data, and the researchers were also concerned that the Ford Focus's tyre pressure monitoring system was vulnerable.

The investigation has raised concerns about the security of car computer systems and how this information is being stored, shared, and used.

Ford responded to the investigation by saying it takes "cyber security seriously" and only shares customer data with authorised dealers with the customer's consent. (staff, 2020)

                                                                    

                        

Comments