{"id":41104,"date":"2022-12-13T13:16:20","date_gmt":"2022-12-13T13:16:20","guid":{"rendered":"https:\/\/knowhow.distrelec.com\/?p=41104"},"modified":"2023-01-12T16:16:09","modified_gmt":"2023-01-12T16:16:09","slug":"ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet","status":"publish","type":"post","link":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/","title":{"rendered":"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet"},"content":{"rendered":"\n<p>Med framv\u00e4xten av ny teknik och avancerade maskiner kan f\u00f6retagens framtid bli s\u00e4krare men ocks\u00e5 mer utsatta f\u00f6r hot eftersom allt \u00f6vervakas och kontrolleras online.&nbsp; Att f\u00f6rst\u00e5 vad cybers\u00e4kerhet \u00e4r idag och hur artificiell intelligens (AI) och maskininl\u00e4rning (ML) kan f\u00f6rb\u00e4ttra s\u00e4kerheten p\u00e5 din anl\u00e4ggning \u00e4r nyckeln till ett v\u00e4lfungerande f\u00f6retag.<\/p>\n\n\n\n<p>F\u00f6r att illustrera hur en b\u00e4ttre f\u00f6rst\u00e5else f\u00f6r artificiell intelligens och maskininl\u00e4rning kommer att hj\u00e4lpa b\u00e5de f\u00f6retag och individer att f\u00f6rsvara sig mot samtida attacker, fokuserar vi p\u00e5 att lyfta fram l\u00f6sningar fr\u00e5n branschledare f\u00f6r att v\u00e4gleda l\u00e4sare att v\u00e4lja r\u00e4tt cybers\u00e4kerhetsl\u00f6sning med AI- och ML-implementeringar.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Gemensam cybers\u00e4kerhetsterminologi&nbsp;<\/strong><\/p>\n\n\n\n<p>Innan vi kommer till sakfr\u00e5gan finns det n\u00e5gra vanliga termer som anv\u00e4nds inom cybers\u00e4kerhet som hj\u00e4lper dig att f\u00f6rst\u00e5 begreppen och senare diskutera l\u00f6sningarna med IT-personal. Du kan hoppa \u00f6ver den h\u00e4r delen om du redan kan terminologin.<\/p>\n\n\n\n<p><strong>Defence in Depth<\/strong><br>Konceptet bygger p\u00e5 m\u00e5nga lager av s\u00e4kerhetsfunktioner som f\u00f6rb\u00e4ttrar systemets \u00f6vergripande s\u00e4kerhet. I h\u00e4ndelse av att en av s\u00e4kerhets\u00e5tg\u00e4rderna \u00e4r ineffektiv, fungerar de andra som backup f\u00f6r att h\u00e5lla n\u00e4tverket s\u00e4kert.<\/p>\n\n\n\n<p><strong>Industriell brandv\u00e4gg<\/strong><br> F\u00f6r att f\u00f6rhindra obeh\u00f6rig \u00e5tkomst \u00e4r industriella brandv\u00e4ggar enheter som \u00f6vervakar och blockerar trafik till eller fr\u00e5n n\u00e4tverk eller n\u00e4tverksenheter, s\u00e5som industriella datorer, kontrollsystem och annan utrustning.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img  loading=\"lazy\"  decoding=\"async\"  height=\"545\"  width=\"1024\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAABAAAAAIhAQMAAADq81ppAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAFtJREFUeNrtwTEBAAAAwqD1T20MH6AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM4GErAAAU5v1KsAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40534 pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-firewalls-1024x545.png\" ><figcaption>Ett koncept med industriella brandv\u00e4ggar som begr\u00e4nsar trafik baserat p\u00e5 en definierad upps\u00e4ttning s\u00e4kerhetsregler. K\u00e4lla: Moxa<\/figcaption><\/figure>\n\n\n\n<p><strong>IDS (Intrusion Detection System)<\/strong><br>Ett industriellt IDS \u00e4r ett verktyg eller system som \u00f6vervakar n\u00e4tverkstrafik f\u00f6r misst\u00e4nkt aktivitet och skickar ut varningar. Varje p\u00e5tr\u00e4ngande aktivitet eller \u00f6vertr\u00e4delse registreras ofta centralt med hj\u00e4lp av ett s\u00e4kerhetsinformations- och h\u00e4ndelsehanteringssystem, som varnar till en administrat\u00f6r, eller b\u00e5da.<\/p>\n\n\n\n<p><strong>IPS (Intrusion Prevention System)<\/strong><br>En industriell IPS \u00e4r ett verktyg eller system som uppt\u00e4cker skadlig aktivitet, registrerar detaljer om det, rapporterar det och sedan anstr\u00e4nger sig f\u00f6r att blockera eller stoppa det. Den genoms\u00f6ker kontinuerligt ett n\u00e4tverk efter skadlig aktivitet och reagerar p\u00e5 den n\u00e4r den intr\u00e4ffar genom att rapportera, blockera eller kassera den. Det kan vara antingen h\u00e5rdvara eller mjukvara.<\/p>\n\n\n\n<p><strong>DPI (Deep Packet Inspection)<\/strong><br>Deep Packet Inspection (DPI) \u00e4r en sorts databehandling som noggrant unders\u00f6ker informationen som \u00f6verf\u00f6rs \u00f6ver ett datorn\u00e4tverk och kan vidta l\u00e4mpliga \u00e5tg\u00e4rder, s\u00e5som larm, blockering, omdirigering eller inloggning. Deep packet inspection anv\u00e4nds ofta f\u00f6r att \u00f6vervaka applikationsbeteende, unders\u00f6ka n\u00e4tverkstrafik, diagnostisera n\u00e4tverksproblem, se till att data \u00e4r i r\u00e4tt format och leta efter till exempel skadlig kod, avlyssning, internetcensur etc.<\/p>\n\n\n\n<p><strong>MalwareDet<\/strong><br>\u00c4r en allm\u00e4n term f\u00f6r alla programvarudesignade hot som orsakar skada p\u00e5 datorn, servern, klienten eller datorn\u00e4tverket. Exempel p\u00e5 skadlig programvara \u00e4r virus, maskar, trojaner, spionprogram, rootkits, adware, fj\u00e4rr\u00e5tkomst och ransomware.<\/p>\n\n\n\n<p><strong>DoS\/DDoS<\/strong><br>Denial-of-service (DoS) \u00e4r en attack som \u00e4r avsedd att st\u00e4nga av maskinen eller n\u00e4tverket, vilket g\u00f6r det om\u00f6jligt att komma \u00e5t f\u00f6r avsedda anv\u00e4ndare. Det kan g\u00f6ras genom att leverera information som orsakar en krasch eller genom att \u00f6versv\u00e4mma m\u00e5let med trafik. F\u00f6r att f\u00f6rhindra att m\u00e5let tar emot eller skickar n\u00e5gon information, kan distribuerade denial-of-service-attacker (DDoS) utf\u00f6ras genom att m\u00e4tta m\u00e5let med trafik fr\u00e5n m\u00e5nga v\u00e4rdar.<\/p>\n\n\n\n<h2 id=\"varfor-ar-industriell-natverkssakerhet-och-cybersakerhet-viktigt\" class=\"wp-block-heading\">Varf\u00f6r \u00e4r industriell n\u00e4tverkss\u00e4kerhet och cybers\u00e4kerhet viktigt?<\/h2>\n\n\n\n<p>I digitaliseringens tids\u00e5lder spelar cybers\u00e4kerhet en nyckelroll i en v\u00e4l fungerande arbetsmilj\u00f6. Det skyddar alla kategorier av data fr\u00e5n sabotage, dataf\u00f6rlust eller andra fel. Med den v\u00e4xande teknologin och fler anslutningsm\u00f6jligheter blir det sv\u00e5rare att \u00f6vervaka och sp\u00e5ra potentiella cyberattacker, s\u00e4rskilt f\u00f6r analytiker eftersom de ofta beh\u00f6ver sl\u00e5 tillbaka mot AI. <\/p>\n\n\n\n<p>Cyberattacker har kostat f\u00f6retag pengar och brottslig skada. D\u00e4rf\u00f6r \u00e4r maskiner och enheter ofta utformade f\u00f6r att f\u00f6rhindra och sp\u00e5ra potentiella problem som uppst\u00e5r i industriella n\u00e4tverk. De kan l\u00e4ra sig om och analysera potentiella cyberrisker i realtid och \u00f6ka cyberanalytikernas effektivitet.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img  loading=\"lazy\"  decoding=\"async\"  width=\"1000\"  height=\"690\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAA+gAAAKyAQMAAAB8D2aCAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAGpJREFUeNrtwQEBAAAAgiD\/r25IQAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPwaU6sAATxGU2kAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40705 pk-lazyload\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 1000px) 100vw, 1000px\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cyber-risk.png\"  data-pk-srcset=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cyber-risk.png 1000w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cyber-risk.png?resize=300,207 300w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cyber-risk.png?resize=768,530 768w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cyber-risk.png?resize=380,262 380w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cyber-risk.png?resize=550,380 550w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cyber-risk.png?resize=800,552 800w\" ><\/figure>\n\n\n\n<h2 id=\"artificiell-intelligens-inom-cybersakerhet-ar-den-battre-an-manniskor\" class=\"wp-block-heading\">Artificiell intelligens inom cybers\u00e4kerhet \u2013 \u00e4r den b\u00e4ttre \u00e4n m\u00e4nniskor?&nbsp;<\/h2>\n\n\n\n<p>Att analysera och f\u00f6rb\u00e4ttra cybers\u00e4kerhet \u00e4r inte l\u00e4ngre en fr\u00e5ga i m\u00e4nsklig skala. AI och ML \u00e4r mer exakta och b\u00e4ttre \u00e4n m\u00e4nniskor och traditionell programvara p\u00e5 att identifiera m\u00f6nster som indikerar skadlig programvara och ovanlig aktivitet. AI och ML kan analysera miljontals h\u00e4ndelser och snabbt identifiera hot som virus och zero-day-s\u00e5rbarhetsattacker.<\/p>\n\n\n\n<p>Enligt Capgemini <a href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2019\/07\/AI-in-Cybersecurity_Report_20190711_V06.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">-rapporten<\/a> h\u00e4vdar mer \u00e4n h\u00e4lften av organisationerna (56%) att deras cybers\u00e4kerhetsanalytiker \u00e4r \u00f6verarbetade, och n\u00e4stan en fj\u00e4rdedel (23%) kan inte noggrant unders\u00f6ka alla incidenter som rapporteras.<\/p>\n\n\n\n<p>Dessutom, enligt rapporten, kommer 69% av f\u00f6retagsledningar inte att kunna svara p\u00e5 cyberattacker utan AI. 80% av telekomf\u00f6retag och 79% av tillverkare av kundvaror s\u00e4ger att de \u00e4r beroende av AI f\u00f6r att hj\u00e4lpa till att identifiera hot och stoppa attacker.<\/p>\n\n\n\n<h3 id=\"tillampningar-av-ml\" class=\"wp-block-heading\">Till\u00e4mpningar av ML<\/h3>\n\n\n\n<p>Maskininl\u00e4rning kan vara effektivare och b\u00e4ttre p\u00e5 att uppt\u00e4cka hot \u00e4n m\u00e4nskliga analytiker.&nbsp;<\/p>\n\n\n\n<p> Enligt Carbonite och Webroot, OpenText-f\u00f6retag i sin <a href=\"https:\/\/media.bitpipe.com\/io_15x\/io_158603\/item_2439672\/Fact%20or%20Fiction%20ebook.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><em>fakta- eller fiktionsrapport<\/em><\/a>, baserad p\u00e5 en unders\u00f6kning som genomf\u00f6rdes mellan mars och april 2021, h\u00e4vdade mer \u00e4n h\u00e4lften (57%) av de tillfr\u00e5gade fr\u00e5n hela v\u00e4rlden att de var offer f\u00f6r en skadlig cyberattack f\u00f6reg\u00e5ende \u00e5r [2020]. 65% av de tillfr\u00e5gade fr\u00e5n rapporten tillade att deras organisationer \u00e4r mer beredda att hantera cybers\u00e4kerhetsattacker eftersom de anv\u00e4nder AI\/ML-drivna cybers\u00e4kerhetsverktyg.<\/p>\n\n\n\n<p>Nuf\u00f6rtiden anv\u00e4nder \u00e4ven hackare effektivt AI. Artificiell intelligens kan skicka tweets mycket snabbare \u00e4n m\u00e4nniskor, och den kan svara mer exakt n\u00e4r den bek\u00e4mpar annan intelligent programvara. Det betyder att implementeringar av ML och AI inte g\u00e5r att undvika. De blir ett nyckelvapen i kampen mot cyberattacker.<\/p>\n\n\n\n<p>D\u00e4rf\u00f6r b\u00f6rjar f\u00f6retag koncentrera sig mer p\u00e5 att motverka hot. De b\u00e4sta applikationerna kommer att vara att analysera enorma m\u00e4ngder data och utf\u00f6ra omfattande operationer f\u00f6r att uppt\u00e4cka avvikelser, misst\u00e4nkt eller ovanligt beteende och zero-day-attacker.<\/p>\n\n\n\n<h2 id=\"cybersakerhet-for-digitala-foretag-siemens\" class=\"wp-block-heading\">Cybers\u00e4kerhet f\u00f6r digitala f\u00f6retag &#8211; Siemens<\/h2>\n\n\n\n<p>Verksamheter och tillverkare fokuserar nu p\u00e5 m\u00e5nga nya implementeringar f\u00f6r att f\u00f6rb\u00e4ttra sina arbetsplatser. Fr\u00e5n smart tillverkning, <a href=\"https:\/\/knowhow.distrelec.com\/sv\/tillverkning\/ar-ditt-foretag-redo-for-industri-5-0\/\" target=\"_blank\" rel=\"noreferrer noopener\">Industry 4.0 och 5.0<\/a> till industriellt Internet of Things (IIoT) och <a href=\"https:\/\/knowhow.distrelec.com\/sv\/internet-of-things-iot\/vad-ar-en-digital-tvilling-och-varfor-ar-den-sa-avgorande-for-industrin\/\" target=\"_blank\" rel=\"noreferrer noopener\">digitala tvillingar<\/a>. Industriv\u00e4rlden \u00e4r uppkopplad och \u00f6vervakad \u2013 det \u00e4r vad de flesta f\u00f6retag str\u00e4var efter. Men i takt med att mer g\u00e5r \u00f6ver till virtualitet, ger nya tekniker olika l\u00f6sningar f\u00f6r att hantera cyberrisker.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.distrelec.ch\/en\/manufacturer\/siemens\/man_sie?queryFromSuggest=true\" target=\"_blank\" rel=\"noreferrer noopener\">Siemens<\/a> fokuserar p\u00e5 att hj\u00e4lpa organisationer att bek\u00e4mpa cyberfara genom att dela medvetenhet p\u00e5 sin <a href=\"https:\/\/new.siemens.com\/global\/en\/products\/automation\/topic-areas\/industrial-security.html\" target=\"_blank\" rel=\"noreferrer noopener\">webbplats<\/a> genom <a href=\"https:\/\/assets.new.siemens.com\/siemens\/assets\/api\/uuid:1c5eebfa-eaef-4d1c-a797-8719bb932559\/dffa-b10556-01-7600-industrial-security-ipdf-en.pdf?ste_sid=57fc78e6b3cf79f2af5c51226bc31b70\" target=\"_blank\" rel=\"noreferrer noopener\">studiefall, whitepapers<\/a>, s\u00e5v\u00e4l som <a href=\"https:\/\/siemens.fm\/public\/podcasts\/f1c79cb930a29989f27556db93b5e920a83fba3eae0a6a20ab49b63f6c5606a1\/details\" target=\"_blank\" rel=\"noreferrer noopener\">podds\u00e4ndningar<\/a> och videor (se nedan). Denna varum\u00e4rkeskunskap och fokus p\u00e5 viktiga branschfall hj\u00e4lper till att skapa de b\u00e4sta l\u00f6sningarna f\u00f6r att bek\u00e4mpa onlinehot.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cybersecurity for Industry: how to protect against cyber-threats?\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/wZYGFU4KyHo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 id=\"siemens-defence-in-depth\" class=\"wp-block-heading\">Siemens Defence in Depth<\/h3>\n\n\n\n<p>Siemens har ett eget &#8221;defence in depth&#8221; och ger s\u00e4tt att bek\u00e4mpa cyberattacker. Genom att f\u00f6lja den internationella standarden IEC 62443 fokuserar Siemens p\u00e5 ett s\u00e4kerhetskoncept i flera lager som ger anl\u00e4ggningar fullt skydd, fr\u00e5n anl\u00e4ggningsledningsniv\u00e5 till f\u00e4lt och s\u00e4ker datakommunikation. Klicka <a href=\"https:\/\/new.siemens.com\/global\/en\/products\/automation\/topic-areas\/industrial-security\/certification-standards.html\" target=\"_blank\" rel=\"noreferrer noopener\">h\u00e4r<\/a> f\u00f6r att ta reda p\u00e5 mer om certifieringar och standarder.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Industrial Security from Siemens\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/dlczMRRFdtQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Anl\u00e4ggningss\u00e4kerhet<\/strong><\/p>\n\n\n\n<p>Anl\u00e4ggningss\u00e4kerhet \u00e4r skyddet och s\u00e4kerhetshanteringen f\u00f6r automationssystem. F\u00f6r att f\u00f6rhindra obeh\u00f6riga personer fr\u00e5n att fysiskt komma \u00e5t viktiga komponenter, anv\u00e4nder anl\u00e4ggningss\u00e4kerhet en m\u00e4ngd olika tekniker, som b\u00f6rjar med standardtilltr\u00e4de till byggnader och str\u00e4cker sig till nyckelkortss\u00e4kerheten i k\u00e4nsliga omr\u00e5den.<\/p>\n\n\n\n<p>Du kan kontakta <a href=\"https:\/\/www.siemens.com\/global\/en\/products\/services\/digital-enterprise-services\/industrial-security-services.html\" target=\"_blank\" rel=\"noreferrer noopener\">Industrial Security Services fr\u00e5n Siemens<\/a> som kan hj\u00e4lpa dig med processer genom att tillhandah\u00e5lla riktlinjer f\u00f6r omfattande anl\u00e4ggningsskydd.<\/p>\n\n\n\n<p><strong>N\u00e4tverkss\u00e4kerhet<\/strong><\/p>\n\n\n\n<p>N\u00e4r det g\u00e4ller n\u00e4tverkss\u00e4kerhet anv\u00e4nds segmentering och krypterad kommunikation f\u00f6r att skydda automationsn\u00e4tverk mot illegal \u00e5tkomst. Fj\u00e4rr\u00e5tkomst till utrustning och anl\u00e4ggningar blir allt vanligare i branschen och, som n\u00e4mnts ovan, ger segmentering ytterligare s\u00e4kerhet.<\/p>\n\n\n\n<p><strong>Systemintegritet<\/strong><\/p>\n\n\n\n<p>Systemintegritet inneb\u00e4r att skydda automationssystem och styrkomponenter. Siemens tillhandah\u00e5ller integrerade s\u00e4kerhetsfunktioner mot obeh\u00f6riga konfigurations\u00e4ndringar p\u00e5 kontrollniv\u00e5 och f\u00f6r obeh\u00f6rig n\u00e4tverks\u00e5tkomst.<\/p>\n\n\n\n<p>Till exempel kan <a href=\"https:\/\/www.distrelec.de\/en\/communication-modules-for-s7-1500-siemens\/pf\/3738481\" target=\"_blank\" rel=\"noreferrer noopener\">SIMATIC S7<\/a> -styrningar och styrsystem som SIMATIC PCS 7 och PCS neo, SCADA och HMI-system s\u00e4kras mot obeh\u00f6rig \u00e5tkomst. Systemintegritet omfattar anv\u00e4ndarautentisering och \u00e5tkomstr\u00e4ttigheter, samt systemh\u00e4rdning mot attacker.<\/p>\n\n\n\n<p>Om du s\u00f6ker integrerade s\u00e4kerhetsfunktioner f\u00f6r att skydda din investering och bibeh\u00e5lla produktivitetsniv\u00e5er, ger SIMATICs G120 Smart Access Module enkel integrering i applikationen och en enkel installationsprocess.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img  loading=\"lazy\"  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40551 pk-lazyload\"  width=\"437\"  height=\"244\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 437px) 100vw, 437px\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6SL3255-0AA00-5AA0-30264253-01.jpg\"  data-pk-srcset=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6SL3255-0AA00-5AA0-30264253-01.jpg 1020w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6SL3255-0AA00-5AA0-30264253-01.jpg?resize=300,168 300w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6SL3255-0AA00-5AA0-30264253-01.jpg?resize=768,429 768w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6SL3255-0AA00-5AA0-30264253-01.jpg?resize=380,212 380w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6SL3255-0AA00-5AA0-30264253-01.jpg?resize=550,307 550w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6SL3255-0AA00-5AA0-30264253-01.jpg?resize=800,447 800w\" ><\/figure><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-red-background-color has-background\" href=\"https:\/\/www.elfa.se\/sv\/web-server-module-for-g120-freqeuency-converters-siemens-6sl3255-0aa00-5aa0\/p\/30264253\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Handla nu<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><a href=\"https:\/\/www.distrelec.ch\/en\/frequency-converters-sinamics-g120x-siemens\/pf\/3763572\" target=\"_blank\" rel=\"noreferrer noopener\">SINAMICs G120X<\/a> fungerar stabilt under alla n\u00e4tverksf\u00f6rh\u00e5llanden, \u00e4r extremt energieffektiv, har olika ramstorlekar och effektomr\u00e5den och anv\u00e4nds i en m\u00e4ngd olika industriella till\u00e4mpningar, fr\u00e5n uppv\u00e4rmning, ventilation, luftkonditioneringssystem, vatten till byggnad och infrastruktur, med mera .<\/p>\n\n\n\n<p><a href=\"https:\/\/www.distrelec.ch\/en\/communication-modules-for-s7-1500-siemens\/pf\/3738481\" target=\"_blank\" rel=\"noreferrer noopener\">S7-1500 PLC-styrningar<\/a> erbjuder h\u00f6gsta prestanda och p\u00e5litliga l\u00f6sningar f\u00f6r alla maskin- och processkontrollapplikationer f\u00f6r att bygga morgondagens digitala fabrik.<\/p>\n\n\n\n<p>En annan enhet \u00e4r den h\u00e4r innovativa peksk\u00e4rmen SIMATIC HMI Comfort-serien som kan koordinera visning via PROFI energi under pauser och st\u00e4nga av den centralt f\u00f6r att minska energif\u00f6rbrukningen och maximal datas\u00e4kerhet i h\u00e4ndelse av str\u00f6mavbrott.&nbsp;<\/p>\n\n\n\n<p>Andra funktioner:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>TFT-bredbildssk\u00e4rm med h\u00f6g uppl\u00f6sning<\/li><li>Upp till 1280 x 800 pixlar f\u00f6r implementering av h\u00f6gpresterande visualiseringsapplikationer p\u00e5 maskinniv\u00e5<\/li><li>Exakt diagnostik g\u00f6rs enkelt via olika anslutningstyper: Ethernet, RS422, RS485, SD-kortplats<\/li><li>USB 2.0 och integrerat minne p\u00e5 24 MB&nbsp;<\/li><li>Fler gr\u00e4nssnitt och f\u00e4rre h\u00e5rdvarukostnader f\u00f6r effektiv operat\u00f6rkontroll och \u00f6vervakning<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img  loading=\"lazy\"  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40568 pk-lazyload\"  width=\"396\"  height=\"221\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 396px) 100vw, 396px\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6AV2124-0JC01-0AX0-30264144-01.jpg\"  data-pk-srcset=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6AV2124-0JC01-0AX0-30264144-01.jpg 1020w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6AV2124-0JC01-0AX0-30264144-01.jpg?resize=300,168 300w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6AV2124-0JC01-0AX0-30264144-01.jpg?resize=768,429 768w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6AV2124-0JC01-0AX0-30264144-01.jpg?resize=380,212 380w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6AV2124-0JC01-0AX0-30264144-01.jpg?resize=550,307 550w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Siemens-6AV2124-0JC01-0AX0-30264144-01.jpg?resize=800,447 800w\" ><\/figure><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-red-background-color has-background\" href=\"https:\/\/www.elfa.se\/sv\/hmi-devices-siemens\/pf\/3763469\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Handla <\/strong>SIMATIC HMI Comfort-serien<\/a><\/div>\n<\/div>\n\n\n\n<h2 id=\"sakra-dina-industriella-natverk-moxa\" class=\"wp-block-heading\">S\u00e4kra dina industriella n\u00e4tverk &#8211; MOXA<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.distrelec.ch\/en\/manufacturer\/moxa\/man_mox?queryFromSuggest=true\" target=\"_blank\" rel=\"noreferrer noopener\">Moxa<\/a>s \u00e5tagande \u00e4r att s\u00e4kerst\u00e4lla p\u00e5litlig anslutning f\u00f6r industriell milj\u00f6. Eftersom m\u00e5nga industriella n\u00e4tverk \u00e4r utsatta f\u00f6r cyberhot har Moxa utvecklat en f\u00f6rb\u00e4ttrad n\u00e4tverkss\u00e4kerhetsportf\u00f6lj. Varum\u00e4rket tillhandah\u00e5ller <a href=\"https:\/\/www.moxa.com\/en\/spotlight\/portfolio\/industrial-network-security\/industrial-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">industriella cybers\u00e4kerhetsl\u00f6sningar<\/a> som inkluderar kritiska IT-cybers\u00e4kerhetsteknologier, s\u00e5som ett Intrusion Prevention System (IPS), en nyckelkomponent f\u00f6r f\u00f6rsvarsstrategier.&nbsp;<\/p>\n\n\n\n<p>Deras industriella cybers\u00e4kerhetsl\u00f6sning har utformats specifikt f\u00f6r att skydda industriella n\u00e4tverk fr\u00e5n cyberhot utan att st\u00f6ra industriell verksamhet. P\u00e5 samma s\u00e4tt som andra varum\u00e4rken som lyfts fram i den h\u00e4r artikeln \u00e4r cybers\u00e4kerhet ett k\u00e4rnfokus f\u00f6r Moxa. De tillhandah\u00e5ller m\u00e5nga <a href=\"https:\/\/www.moxa.com\/en\/literature-library\/case-studies-enhancing-cybersecurity-resilience\" target=\"_blank\" rel=\"noreferrer noopener\">st\u00f6dk\u00e4llor<\/a> f\u00f6r att hj\u00e4lpa dig f\u00f6rst\u00e5 cyberrisken b\u00e4ttre och hitta de b\u00e4sta l\u00f6sningarna f\u00f6r eventuell skadlig programvara.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img  loading=\"lazy\"  decoding=\"async\"  height=\"484\"  width=\"1024\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAABAAAAAHkAQMAAACaPs\/zAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAFJJREFUeNrtwQEBAAAAgiD\/r25IQAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBu8+QAATD8R\/kAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40585 pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-Industrial-Network-Security-Reference-Architecture-1024x484.png\" ><figcaption>Moxas referensarkitektur f\u00f6r industriell n\u00e4tverkss\u00e4kerhet. K\u00e4lla: Moxa<\/figcaption><\/figure>\n\n\n\n<h3 id=\"moxa-sakra-anslutningar\" class=\"wp-block-heading\">Moxa s\u00e4kra anslutningar<\/h3>\n\n\n\n<p>Det finns allt fler cyberattacker riktade mot industriella n\u00e4tverk, och det \u00e4r avg\u00f6rande att identifiera och mildra s\u00e5rbarheter innan de kan utnyttjas. F\u00f6retag m\u00e5ste se till att n\u00e4tverksarkitekturen som st\u00f6der deras industriella n\u00e4tverk \u00e4r s\u00e4ker, s\u00e5 att endast godk\u00e4nd trafik kan passera till r\u00e4tt platser.<\/p>\n\n\n\n<p>Att f\u00e5 tillf\u00f6rlitlig och s\u00e4ker data\u00f6verf\u00f6ring fr\u00e5n driftteknik (OT, operational technology)-enheter till IT-baserade molntj\u00e4nster \u00e4r en stor sv\u00e5righet f\u00f6r m\u00e5nga systemintegrat\u00f6rer och ingenj\u00f6rer inom IIoT. Kombinationen av Moxas starka, molnklara IIoT-gateways och v\u00e4rdeskapande mjukvara med l\u00e5ng livscykel erbjuder s\u00e4kra och tillf\u00f6rlitliga IIoT-l\u00f6sningar som snabbt kan byggas och implementeras i f\u00e4lt. Moxa tillhandah\u00e5ller OT\/IT-integrerade n\u00e4tverkss\u00e4kerhetsl\u00f6sningar genom att bek\u00e4mpa cyberhot p\u00e5 tv\u00e5 s\u00e4tt:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>F\u00f6rst\u00e4rk din n\u00e4tverksinfrastruktur med hj\u00e4lp av enhet-f\u00f6r-enhet- och lager-f\u00f6r-lager-s\u00e4kerhetsfunktioner f\u00f6r att s\u00e4kerst\u00e4lla att legitim datatrafik p\u00e5 n\u00e4tverket f\u00f6rblir s\u00e4ker.&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>Skydda dina kritiska tillg\u00e5ngar och n\u00e4tverk med specifika OT-protokoll och paketinspektion, samt m\u00f6nsterbaserat skydd.<\/li><\/ol>\n\n\n\n<p>Moxa m\u00f6jligg\u00f6r s\u00e4ker edge-uppkoppling eftersom det verkligen \u00e4r viktigt att se till att enheter vid \u00e4nden \u00e4r s\u00e4kert anslutna, innan man applicerar ytterligare ett lager av skydd (segmentering av n\u00e4tverket med routrar och sedan s\u00e4kra tillg\u00e5ngar med IDS\/IPS\/brandv\u00e4ggar). Moxas flerskiktiga cybers\u00e4kerhetsstrategi \u00e4r baserad p\u00e5 industristandarden IEC-62443 och varum\u00e4rket s\u00e4krar dina OT-n\u00e4tverk med OT\/IT-integrerad s\u00e4kerhet genom:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong> Uniting Networking and Cybersecurity<\/strong> \u2013 kombinerar industriellt n\u00e4tverkande och cybers\u00e4kerhetsexpertis f\u00f6r att tillhandah\u00e5lla skiktat skydd f\u00f6r ditt industriella n\u00e4tverk.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Continuously Enhancing Security<\/strong> &#8211; Moxa tar ett proaktivt tillv\u00e4gag\u00e5ngss\u00e4tt f\u00f6r att skydda v\u00e5ra produkter fr\u00e5n s\u00e4kerhetsbrister och hj\u00e4lpa anv\u00e4ndare med b\u00e4ttre s\u00e4kerhetsriskhantering.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Developing IT\/OT Security<\/strong> &#8211; Moxa \u00e4r en TXOne Networks-partner som svarar p\u00e5 de v\u00e4xande s\u00e4kerhetsbehoven inom industrier samt s\u00e4kerhetskraven fr\u00e5n IT\/OT-personal.<\/li><\/ul>\n\n\n\n<p>Varum\u00e4rkets erbjudande inkluderar centraliserad n\u00e4tverks- och s\u00e4kerhetshantering och fj\u00e4rranslutningshantering, skydd av industriella tillg\u00e5ngar med IPS och IDS<\/p>\n\n\n\n<p>s\u00e4kert n\u00e4tverk och edge-anslutning med h\u00e4rdade industriella n\u00e4tverksenheter.&nbsp;<\/p>\n\n\n\n<p>Fr\u00e5n <a href=\"https:\/\/www.distrelec.com\/global\/\" target=\"_blank\" rel=\"noreferrer noopener\">Elfa Distrelec<\/a> kan du f\u00e5 ett brett utbud av edge-anslutningsenheter som protokollomvandlare och seriella till ethernet-enhetsservrar fr\u00e5n Nports 6000 (se nedan) till <a href=\"https:\/\/www.distrelec.ch\/en\/modbus-gateways\/pf\/702434\">Mgate MB3000<\/a>-serien. <a href=\"https:\/\/www.distrelec.ch\/en\/layer-managed-switches-eds-405a\/408a\/508a-moxa\/pf\/2816153\" target=\"_blank\" rel=\"noreferrer noopener\"> Ethernet<\/a> och <a href=\"https:\/\/www.distrelec.ch\/en\/automation\/industrial-communication\/industrial-network-infrastructure\/wireless-ap-bridge-client\/c\/cat-DNAV_PL_2827930?queryFromSuggest=true&amp;filter_Manufacturer=Moxa\" target=\"_blank\" rel=\"noreferrer noopener\">tr\u00e5dl\u00f6s<\/a> anslutning kan levereras av <a href=\"https:\/\/www.distrelec.ch\/en\/layer-managed-switches-eds-405a\/408a\/508a-moxa\/pf\/2816153\" target=\"_blank\" rel=\"noreferrer noopener\">hanterade switchar<\/a>, inklusive smart managed <a href=\"https:\/\/www.distrelec.ch\/en\/industrial-ethernet-switches-moxa\/pf\/1645126\" target=\"_blank\" rel=\"noreferrer noopener\">SDS-3008<\/a> och en ny AWK-serie f\u00f6r Wi-Fi-produkter som kommer snart under f\u00f6rsta kvartalet 2023 (IEC 62334-4-2-certifierad).<\/p>\n\n\n\n<p><strong>Seriella enhetsservrar<\/strong><\/p>\n\n\n\n<p>NPort 6000-enhetsservrarna anv\u00e4nder SSL- och SSH-protokoll f\u00f6r att \u00f6verf\u00f6ra krypterad seriell data \u00f6ver Ethernet. SSL- och SSH-protokollen, som fungerar genom att kryptera data innan de \u00f6verf\u00f6rs \u00f6ver n\u00e4tverket, st\u00f6ds av NPort 6000 f\u00f6r att l\u00f6sa detta problem. Anv\u00e4ndare kan vara s\u00e4kra p\u00e5 att seriell data skickas s\u00e4kert \u00f6ver b\u00e5de privata och publika n\u00e4tverk med NPort 6000.<\/p>\n\n\n\n<p>Andra funktioner:<strong>&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>S\u00e4kra driftl\u00e4gen f\u00f6r Real COM, TCP-server, TCP-klient, parad anslutning, terminal och omv\u00e4nd terminal<\/li><li>Alla baudhastigheter st\u00f6ds med h\u00f6g precision<\/li><li>Val av n\u00e4tverksmedium: 10\/100BaseTX eller 100BaseFX<\/li><li>Automatisk RS-485 datariktningskontroll med patenterad Moxa ADDC<\/li><li>Portbuffert f\u00f6r lagring av seriella data om Ethernet \u00e4r inte tillg\u00e4ngligt<\/li><li>SD-plats f\u00f6r att ut\u00f6ka portbuffertminnet<\/li><li>Ut\u00f6kat arbetstemperaturomr\u00e5de: -40&#8230;+75\u00b0C<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img  loading=\"lazy\"  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40602 pk-lazyload\"  width=\"334\"  height=\"187\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 334px) 100vw, 334px\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-NPORT6250-12573580-01.jpg\"  data-pk-srcset=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-NPORT6250-12573580-01.jpg 1020w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-NPORT6250-12573580-01.jpg?resize=300,168 300w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-NPORT6250-12573580-01.jpg?resize=768,429 768w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-NPORT6250-12573580-01.jpg?resize=380,212 380w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-NPORT6250-12573580-01.jpg?resize=550,307 550w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Moxa-NPORT6250-12573580-01.jpg?resize=800,447 800w\" ><\/figure><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-red-background-color has-background\" href=\"https:\/\/www.elfa.se\/sv\/serial-device-servers-nport-6100\/6200-moxa\/pf\/2819425\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Handla <\/strong>nu<\/a><\/div>\n<\/div>\n\n\n\n<p>L\u00e4s mer om hur Moxa hj\u00e4lper till att s\u00e4kra dina industriella n\u00e4tverk i Europa <a href=\"https:\/\/moxa-europe.com\/solutions\/cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">h\u00e4r<\/a>.<\/p>\n\n\n\n<h2 id=\"komma-igang-med-industriell-cybersakerhet-hirschmann\" class=\"wp-block-heading\">Komma ig\u00e5ng med industriell cybers\u00e4kerhet &#8211; Hirschmann<\/h2>\n\n\n\n<p>Som n\u00e4mnts tidigare f\u00f6rb\u00e4ttrar digitaliseringen och den v\u00e4xande sammankopplingen av maskiner och industrisystem uppenbarligen anl\u00e4ggningen, men kan ocks\u00e5 uts\u00e4tta f\u00f6retaget f\u00f6r cyberrisk. Enligt varum\u00e4rkets k\u00e4lla \u00f6kar <a href=\"https:\/\/www.belden.com\/blogs\/getting-started-with-industrial-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">attackerna mot tillverkningsanl\u00e4ggningar \u00f6ver hela v\u00e4rlden<\/a>. D\u00e4rf\u00f6r \u00e4r skyddet av industriella anl\u00e4ggningar avg\u00f6rande mot inre och yttre st\u00f6rningar.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.distrelec.ch\/en\/manufacturer\/hirschmann\/man_bhi?queryFromSuggest=true\" target=\"_blank\" rel=\"noreferrer noopener\">Hirschmann<\/a>, ett varum\u00e4rke fr\u00e5n Belden, tillhandah\u00e5ller industriella cybers\u00e4kerhetsl\u00f6sningar. Varum\u00e4rket fokuserar p\u00e5 avancerade industriella n\u00e4tverksl\u00f6sningar. I det breda utbudet produkter finns industriella kontakter, kontrollerade och ohanterade Ethernet-switchar, mediaomvandlare, tr\u00e5dl\u00f6st LAN och s\u00e4kerhet.&nbsp;<\/p>\n\n\n\n<p>N\u00e5gra s\u00e4tt att b\u00f6rja med industriell cybers\u00e4kerhet:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>N\u00e4tverksbed\u00f6mning<\/strong> &#8211; titta p\u00e5 ditt OT-n\u00e4tverk f\u00f6r att ta reda p\u00e5 alla enheter som \u00e4r anslutna till det, s\u00e5som maskiner, sensorer, styrningar, enheter, switchar, kameror, etc. Sedan kan du fastst\u00e4lla hur enheterna anv\u00e4nds och uppr\u00e4tta en baslinje f\u00f6r att \u00f6vervaka och m\u00e4ta varje enhet \u00f6ver tid f\u00f6r att sp\u00e5ra f\u00f6r\u00e4ndringar.&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Identifiera eventuella cyberattacker &#8211;<\/strong> skanna och identifiera IP-adresser f\u00f6r att uppt\u00e4cka nya ok\u00e4nda enheter utan att skapa ytterligare trafik eller f\u00f6rdr\u00f6jning. Detta kan hj\u00e4lpa till att identifiera oseri\u00f6sa eller illegala enheter som utbyter data under uppt\u00e4cktsfasen. Du kan sedan g\u00f6ra ytterligare forskning f\u00f6r att l\u00e4ra dig mer om s\u00e5dana enheter och bed\u00f6ma deras potential f\u00f6r skada.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Utveckla en djupf\u00f6rsvarsstrategi <\/strong>&nbsp;\u2013 det \u00e4r i grunden ett f\u00f6rh\u00e5llningss\u00e4tt till cybers\u00e4kerhet fr\u00e5n att planera hur man skyddar v\u00e4rdefull data och f\u00f6rhindrar allt nedstr\u00f6ms. Strategin g\u00f6r det m\u00f6jligt att identifiera det absoluta minimum som kr\u00e4vs mellan att flytta fr\u00e5n en enhet till en annan, till exempel efter att ha samarbetat med driftansvariga f\u00f6r SCADA-n\u00e4tverk f\u00f6r att best\u00e4mma vilken information som m\u00e5ste fl\u00f6da fr\u00e5n en cell av robotar ut till olika industriell utrustning via PLC:er och HMI:er.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Segmentera ditt n\u00e4tverk <\/strong>\u2013 n\u00e4tverkssegmentering kan bidra till att f\u00f6rb\u00e4ttra s\u00e4kerheten. Till exempel kan separering av OT-n\u00e4tverk fr\u00e5n andra n\u00e4tverk internt och externt m\u00f6jligg\u00f6ra s\u00e4kert delad data. Att separera\/segmentera n\u00e4tverket kan hj\u00e4lpa till att inte sprida hotet till andra enheter (om attacken sker p\u00e5 ett segment av n\u00e4tverket kommer det andra segmentet inte att p\u00e5verkas).<\/li><\/ol>\n\n\n\n<p>N\u00e4r du vet lite kan du b\u00f6rja f\u00f6rb\u00e4ttra din cybers\u00e4kerhetsstrategi (defence in depth).&nbsp;<\/p>\n\n\n\n<p>Hirschmann erbjuder end-to-end-cybers\u00e4kerhetsl\u00f6sningar, fr\u00e5n brandv\u00e4ggsl\u00f6sningar till routrar och n\u00e4tverksprogram. Se videon nedan f\u00f6r att f\u00e5 reda p\u00e5 mer om <a href=\"https:\/\/www.distrelec.ch\/en\/industrial-firewalls-eagle-belden\/pf\/3507941\" target=\"_blank\" rel=\"noreferrer noopener\">industrial firewall EAGLE40<\/a>-funktionerna.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Hirschmann EAGLE40 - Next Generation Industrial Firewall (EN)\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/g-d14xMU9hY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-red-background-color has-background\" href=\"https:\/\/www.elfa.se\/sv\/manufacturer\/hirschmann\/man_bhi?ikw=Lumberg&amp;int_cid=2143manufacturer.column-Hirschmann-nav&amp;no-cache=true\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Handla <\/strong>Hirschmann<\/a><\/div>\n<\/div>\n\n\n\n<h2 id=\"industriell-cybersakerhet-phoenix-contact\" class=\"wp-block-heading\">Industriell cybers\u00e4kerhet &#8211; Phoenix Contact<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.distrelec.ch\/en\/manufacturer\/phoenix-contact\/man_pho?queryFromSuggest=true\" target=\"_blank\" rel=\"noreferrer noopener\">Phoenix Contact<\/a> \u00e4r en ytterligare <a href=\"https:\/\/www.distrelec.com\/global\/\" target=\"_blank\" rel=\"noreferrer noopener\">Elfa Distrelec<\/a>-leverant\u00f6r som tillhandah\u00e5ller l\u00f6sningar f\u00f6r i princip alla branscher, fr\u00e5n maskintillverkare, systemoperat\u00f6rer och fordonsindustri till energi-, vatten- och olje- och gasindustri. Varum\u00e4rket kan hj\u00e4lpa dig att uppn\u00e5 maximal stabilitet och transparens f\u00f6r din infrastruktur genom att v\u00e4lja l\u00e4mplig och n\u00f6dv\u00e4ndig h\u00e5rdvara.<\/p>\n\n\n\n<p>Det finns gott om l\u00f6sningar p\u00e5 cyberrisker och Phoenix Contact visar typiska exempel p\u00e5 hot och hur man l\u00f6ser dem.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Risk<\/strong><\/td><td><strong>L\u00f6sning<\/strong><\/td><\/tr><tr><td>Multifunktioner fr\u00e5n kontoret<\/td><td>N\u00e4tverkssegmentering<\/td><\/tr><tr><td>Hackerattacker<\/td><td>Krypterad data\u00f6verf\u00f6ring<\/td><\/tr><tr><td>Malware-attack<\/td><td>Begr\u00e4nsa kommunikationen<\/td><\/tr><tr><td>Infekterad h\u00e5rdvara<\/td><td>Skydda portar<\/td><\/tr><tr><td>Obeh\u00f6rig \u00e5tkomst till system<\/td><td>S\u00e4ker fj\u00e4rr\u00e5tkomst<\/td><\/tr><tr><td>Otillr\u00e4cklig anv\u00e4ndaradministration<\/td><td>Central anv\u00e4ndarhantering<\/td><\/tr><tr><td>Mobila slutenheter<\/td><td>S\u00e4ker WLAN-l\u00f6senordstilldelning<\/td><\/tr><tr><td>Os\u00e4ker eller felaktig enhetskonfiguration<\/td><td>Enhets- och patchhantering<\/td><\/tr><\/tbody><\/table><figcaption>Typiska exempel p\u00e5 s\u00e4kerhetsrisker och deras l\u00f6sningar. K\u00e4lla: Phoenix Contact<\/figcaption><\/figure>\n\n\n\n<p>I varum\u00e4rkets utbud finns produkter med s\u00e4kerhetsfunktioner, s\u00e5 som s\u00e4ker anv\u00e4ndarautentisering, n\u00e4tverkssegmentering, n\u00e4tverks\u00f6vervakning och brandv\u00e4ggsfunktioner eller anv\u00e4ndning av s\u00e4kra och krypterade kommunikationsprotokoll.&nbsp;<\/p>\n\n\n\n<h3 id=\"phoenix-contact-automationslosningar\" class=\"wp-block-heading\">Phoenix Contact automationsl\u00f6sningar<\/h3>\n\n\n\n<p>I enlighet med den internationella standarden IEC 62443-2-4 har Phoenix Contact kapacitet att skapa och lansera s\u00e4kra automationssystem. I enlighet med en skyddskravsanalys och skyddsm\u00e5len konfidentialitet, integritet och tillg\u00e4nglighet tillhandah\u00e5ller f\u00f6retaget s\u00e4kra automationsl\u00f6sningar. Hot- och s\u00e4kerhetsriskanalys ing\u00e5r ocks\u00e5 i deras tj\u00e4nster.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img  loading=\"lazy\"  decoding=\"async\"  height=\"608\"  width=\"1024\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAABAAAAAJgAQMAAAAu94OgAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAGJJREFUeNrtwQEBAAAAgiD\/r25IQAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADvBjJvAAEhKZPyAAAAAElFTkSuQmCC\"  alt=\"\"  class=\"wp-image-40636 pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1024x608.png\" ><figcaption>Processen f\u00f6r att s\u00e4kra automationsprodukter med Phoenix Contact. K\u00e4lla: Phoenix Contact<\/figcaption><\/figure><\/div>\n\n\n<p>I likhet med andra varum\u00e4rken som n\u00e4mnts tidigare erbjuder Phoenix Contact tj\u00e4nster fr\u00e5n utv\u00e4rdering och planering till implementering, underh\u00e5ll, support samt \u00e4ven seminarier. Nedan hittar du n\u00e5gra av produkterna som ger s\u00e4kerhet fr\u00e5n utveckling till patchhantering.&nbsp;<\/p>\n\n\n\n<p><strong>mGuard Security<\/strong><\/p>\n\n\n\n<p>K\u00e4rnan i ditt system best\u00e5r av mGuard s\u00e4kerhetsroutrar. Djup paketinspektion f\u00f6r industriella protokoll, villkorliga brandv\u00e4ggar, anv\u00e4ndarbrandv\u00e4ggar och s\u00e4ker n\u00e4tverks\u00e5tkomst f\u00f6r servicepersonal \u00e4r bara n\u00e5gra av de unika brandv\u00e4ggsfunktioner de tillhandah\u00e5ller. Dessutom har du tillg\u00e5ng till ett system f\u00f6r snabbt och s\u00e4kert fj\u00e4rrunderh\u00e5ll genom mGuard Secure Cloud.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img  loading=\"lazy\"  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40653 pk-lazyload\"  width=\"485\"  height=\"271\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 485px) 100vw, 485px\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1153079-30316916-01.jpg\"  data-pk-srcset=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1153079-30316916-01.jpg 1020w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1153079-30316916-01.jpg?resize=300,168 300w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1153079-30316916-01.jpg?resize=768,429 768w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1153079-30316916-01.jpg?resize=380,212 380w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1153079-30316916-01.jpg?resize=550,307 550w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1153079-30316916-01.jpg?resize=800,447 800w\" ><\/figure><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-red-background-color has-background\" href=\"https:\/\/www.elfa.se\/sv\/routers-fl-mguard-phoenix-contact\/pf\/1716126\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Handla <\/strong>nu<\/a><\/div>\n<\/div>\n\n\n\n<p><strong>PLCnext Security<\/strong><\/p>\n\n\n\n<p>PLCnext Control-enheterna \u00e4r, som varum\u00e4rket h\u00e4vdar, &#8221;secure by design&#8221; i enlighet med IEC 62443-certifiering. De \u00e4r skalbara styrningar med skyddsniv\u00e5 IP20. Med l\u00f6sningar f\u00f6r alla IOT-applikationer bygger PLCnext logikstyrningar ett ekosystem f\u00f6r \u00e4ndl\u00f6s automation. Dra nytta av den mycket anpassningsbara \u00f6ppna kontrollplattformen, PLCnext modul\u00e4ra teknikprogramvara, PLCnext Store, molnintegration och PLCnext Community Sharing Platform.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The open control platform PLCnext Technology by PHOENIX CONTACT\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/rtq8FIkhwJc?start=56&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img  loading=\"lazy\"  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\"wp-image-40670 pk-lazyload\"  width=\"517\"  height=\"289\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 517px) 100vw, 517px\"  data-pk-src=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1051328-30239115-01.jpg\"  data-pk-srcset=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1051328-30239115-01.jpg 1020w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1051328-30239115-01.jpg?resize=300,168 300w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1051328-30239115-01.jpg?resize=768,429 768w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1051328-30239115-01.jpg?resize=380,212 380w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1051328-30239115-01.jpg?resize=550,307 550w, https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/Phoenix-Contact-1051328-30239115-01.jpg?resize=800,447 800w\" ><\/figure><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-red-background-color has-background\" href=\"https:\/\/www.elfa.se\/sv\/programmable-logic-controllers-plcnext-phoenix-contact\/pf\/3722567?digitalDataLayerTerm=plcnext&amp;no-cache=true&amp;marketingPopup=false&amp;marketingPopup=false\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Handla <\/strong>nu<\/a><\/div>\n<\/div>\n\n\n\n<p>Phoenix Contacts produkter \u00e4r f\u00f6rem\u00e5l f\u00f6r s\u00e5rbarhetshantering (<a href=\"https:\/\/www.phoenixcontact.com\/de-de\/service-und-support\/psirt\" target=\"_blank\" rel=\"noreferrer noopener\">PSIRT<\/a>) d\u00e4r s\u00e4kerhetskorrigeringar och uppdateringar tillhandah\u00e5lls f\u00f6r eventuella s\u00e4kerhetsbrister som identifieras.&nbsp;<\/p>\n\n\n\n<h2 id=\"sammanfattning\" class=\"wp-block-heading\">Sammanfattning<\/h2>\n\n\n\n<p>Cyberrisken kommer att v\u00e4xa och f\u00f6retag m\u00e5ste vara beredda p\u00e5 att det kan finnas fler online-hot som attackerar deras system i framtiden. N\u00e5gra av l\u00f6sningarna som presenteras ovan kan hj\u00e4lpa dig att s\u00e4kra dina n\u00e4tverk. Med ett ordentligt &#8221;defence in depth&#8221;, industriella brandv\u00e4ggar och IPS eller IDS har du stor chans att op\u00e5litlig trafik bek\u00e4mpas. Idag, f\u00f6r att bek\u00e4mpa system, beh\u00f6ver du implementera liknande verktyg som snabbt kan f\u00f6ruts\u00e4ga och anpassa sig till risksituationer online. Det m\u00e5ste ofta vara ML eller AI som sl\u00e5ss mot en annan maskin eller avancerat expertsystem.<\/p>\n","protected":false},"excerpt":{"rendered":"Med framv\u00e4xten av ny teknik och avancerade maskiner kan f\u00f6retagens framtid bli s\u00e4krare men ocks\u00e5 mer utsatta f\u00f6r&hellip;\n","protected":false},"author":16,"featured_media":40704,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1024,1013,242],"tags":[],"coauthors":[],"class_list":{"0":"post-41104","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-automation-sv","8":"category-internet-of-things-iot","9":"category-it-digital-sv","10":"cs-entry","11":"cs-video-wrap"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet - KnowHow<\/title>\n<meta name=\"description\" content=\"N\u00e4r m\u00e5nga organisationer och f\u00f6retag f\u00f6rlitar sig p\u00e5 ny teknik \u00e4r implementeringar av AI och ML nyckeln till att bek\u00e4mpa cyberrisker.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet - KnowHow\" \/>\n<meta property=\"og:description\" content=\"N\u00e4r m\u00e5nga organisationer och f\u00f6retag f\u00f6rlitar sig p\u00e5 ny teknik \u00e4r implementeringar av AI och ML nyckeln till att bek\u00e4mpa cyberrisker.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/\" \/>\n<meta property=\"og:site_name\" content=\"KnowHow\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-13T13:16:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-12T16:16:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity-1024x410.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Justyna Matuszak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Justyna Matuszak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/\"},\"author\":{\"name\":\"Justyna Matuszak\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/person\/0f190c371d7aa3b29340b10882910edb\"},\"headline\":\"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet\",\"datePublished\":\"2022-12-13T13:16:20+00:00\",\"dateModified\":\"2023-01-12T16:16:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/\"},\"wordCount\":3562,\"publisher\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#organization\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png\",\"articleSection\":[\"Automation\",\"Internet of Things (IoT)\",\"IT &amp; digital\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/\",\"url\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/\",\"name\":\"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet - KnowHow\",\"isPartOf\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png\",\"datePublished\":\"2022-12-13T13:16:20+00:00\",\"dateModified\":\"2023-01-12T16:16:09+00:00\",\"description\":\"N\u00e4r m\u00e5nga organisationer och f\u00f6retag f\u00f6rlitar sig p\u00e5 ny teknik \u00e4r implementeringar av AI och ML nyckeln till att bek\u00e4mpa cyberrisker.\",\"breadcrumb\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png\",\"width\":2000,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hem\",\"item\":\"https:\/\/knowhow.distrelec.com\/sv\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#website\",\"url\":\"https:\/\/knowhow.distrelec.com\/sv\/\",\"name\":\"KnowHow\",\"description\":\"KnowHow Hub\",\"publisher\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/knowhow.distrelec.com\/sv\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#organization\",\"name\":\"Distrelec\",\"url\":\"https:\/\/knowhow.distrelec.com\/sv\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png\",\"width\":530,\"height\":98,\"caption\":\"Distrelec\"},\"image\":{\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/person\/0f190c371d7aa3b29340b10882910edb\",\"name\":\"Justyna Matuszak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/person\/image\/9a432b6fa69e68c439c1a2d8acf914c3\",\"url\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2024\/02\/cropped-Justyna-scaled-3-96x96.jpg\",\"contentUrl\":\"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2024\/02\/cropped-Justyna-scaled-3-96x96.jpg\",\"caption\":\"Justyna Matuszak\"},\"description\":\"Justyna, as a Digital Content Writer at Distrelec, is responsible for writing and managing content on KnowHow. She studied Journalism and Social Communication with a specialisation in social media and e-PR. In that time, she participated in journalist internships in Wroclaw (PL) and London. She is passionate about innovations, the digital world and the impact technology has on our lives. Her interests are sport, music and film photography.\",\"sameAs\":[\"http:\/\/www.distrelec.com\",\"https:\/\/uk.linkedin.com\/in\/justyna-matuszak-217b51172\"],\"url\":\"https:\/\/knowhow.distrelec.com\/sv\/author\/justyna-matusza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet - KnowHow","description":"N\u00e4r m\u00e5nga organisationer och f\u00f6retag f\u00f6rlitar sig p\u00e5 ny teknik \u00e4r implementeringar av AI och ML nyckeln till att bek\u00e4mpa cyberrisker.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/","og_locale":"sv_SE","og_type":"article","og_title":"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet - KnowHow","og_description":"N\u00e4r m\u00e5nga organisationer och f\u00f6retag f\u00f6rlitar sig p\u00e5 ny teknik \u00e4r implementeringar av AI och ML nyckeln till att bek\u00e4mpa cyberrisker.","og_url":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/","og_site_name":"KnowHow","article_published_time":"2022-12-13T13:16:20+00:00","article_modified_time":"2023-01-12T16:16:09+00:00","og_image":[{"width":1024,"height":410,"url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity-1024x410.png","type":"image\/png"}],"author":"Justyna Matuszak","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"Justyna Matuszak","Ber\u00e4knad l\u00e4stid":"14 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#article","isPartOf":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/"},"author":{"name":"Justyna Matuszak","@id":"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/person\/0f190c371d7aa3b29340b10882910edb"},"headline":"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet","datePublished":"2022-12-13T13:16:20+00:00","dateModified":"2023-01-12T16:16:09+00:00","mainEntityOfPage":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/"},"wordCount":3562,"publisher":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/#organization"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage"},"thumbnailUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png","articleSection":["Automation","Internet of Things (IoT)","IT &amp; digital"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/","url":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/","name":"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet - KnowHow","isPartOf":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/#website"},"primaryImageOfPage":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage"},"thumbnailUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png","datePublished":"2022-12-13T13:16:20+00:00","dateModified":"2023-01-12T16:16:09+00:00","description":"N\u00e4r m\u00e5nga organisationer och f\u00f6retag f\u00f6rlitar sig p\u00e5 ny teknik \u00e4r implementeringar av AI och ML nyckeln till att bek\u00e4mpa cyberrisker.","breadcrumb":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#primaryimage","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png","width":2000,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/knowhow.distrelec.com\/sv\/automation-sv\/ai-och-maskininlarning-inom-cybersakerhet-och-industriell-sakerhet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hem","item":"https:\/\/knowhow.distrelec.com\/sv\/"},{"@type":"ListItem","position":2,"name":"AI och maskininl\u00e4rning inom cybers\u00e4kerhet och industriell s\u00e4kerhet"}]},{"@type":"WebSite","@id":"https:\/\/knowhow.distrelec.com\/sv\/#website","url":"https:\/\/knowhow.distrelec.com\/sv\/","name":"KnowHow","description":"KnowHow Hub","publisher":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/knowhow.distrelec.com\/sv\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/knowhow.distrelec.com\/sv\/#organization","name":"Distrelec","url":"https:\/\/knowhow.distrelec.com\/sv\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/logo\/image\/","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2021\/09\/distrelec_logo.png","width":530,"height":98,"caption":"Distrelec"},"image":{"@id":"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/person\/0f190c371d7aa3b29340b10882910edb","name":"Justyna Matuszak","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/knowhow.distrelec.com\/sv\/#\/schema\/person\/image\/9a432b6fa69e68c439c1a2d8acf914c3","url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2024\/02\/cropped-Justyna-scaled-3-96x96.jpg","contentUrl":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2024\/02\/cropped-Justyna-scaled-3-96x96.jpg","caption":"Justyna Matuszak"},"description":"Justyna, as a Digital Content Writer at Distrelec, is responsible for writing and managing content on KnowHow. She studied Journalism and Social Communication with a specialisation in social media and e-PR. In that time, she participated in journalist internships in Wroclaw (PL) and London. She is passionate about innovations, the digital world and the impact technology has on our lives. Her interests are sport, music and film photography.","sameAs":["http:\/\/www.distrelec.com","https:\/\/uk.linkedin.com\/in\/justyna-matuszak-217b51172"],"url":"https:\/\/knowhow.distrelec.com\/sv\/author\/justyna-matusza\/"}]}},"jetpack_featured_media_url":"https:\/\/knowhow.distrelec.com\/wp-content\/uploads\/2022\/11\/cybersecurity.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/posts\/41104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/comments?post=41104"}],"version-history":[{"count":0,"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/posts\/41104\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/media\/40704"}],"wp:attachment":[{"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/media?parent=41104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/categories?post=41104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/tags?post=41104"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/knowhow.distrelec.com\/sv\/wp-json\/wp\/v2\/coauthors?post=41104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}