<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Why the Mining Industry Relies on Rugged Visibility and Cybersecurity Solutions

March 11, 2021

 Mining Industry Cybersecurity Solutions

When many think about the mining industry, they’re probably not thinking about new technologies. Instead, they might be conjuring up mental images of grueling manual labor. Scenes straight out of the 19th century, with workers swinging pickaxes and pushing carts in narrow tunnels where lighting and airflow are scarce and safety hazards plentiful.

But these impressions are no longer fully accurate. Subsurface resource extraction, like so many other industries, has become an increasingly technology-driven affair. Rio Tinto, for example, has been using industrial internet of things (IIoT) devices to operate a fleet of driverless trucks for more than a decade, and this solution has allowed it to reduce safety risks while also optimizing expenses and logistics. Likewise, Fortescue Metals Group uses connected monitors to obtain mobile views of the loads carried by its vehicle fleet, and this solution allows it to alert drivers in real time when trucks are not operating at full capacity, thereby conserving resources. Meanwhile, Goldcorp has developed an IIoT solution that uses tracking devices in miners’ helmets to determine when, where, and how to regulate air flows in mine shafts.

These companies’ experiences are leading more and more mining principals to realize the advantages – operational, financial, and logistical – offered by IIoT devices. As a result, demand for smart mining solutions that utilize wireless communication, real-time monitoring, advanced analytics, and artificial intelligence (AI) is growing.

Indeed, in its recent “Smart Mining Market: Growth, Trends and Forecasts 2020-2025” report, Mordor Intelligence estimated the value of the market for connected solutions in the mining industry at US$8 billion in 2020. It also predicted that this value would more than triple in value over the next five years, rising to $24.23 billion by 2026.

Nevertheless, fully realizing all the benefits of this growth is not necessarily an easy matter.


Wherever there are OT/IT systems, there are cybersecurity risks

Mining companies considering IIoT solutions must also be aware that every single connected device has the potential to serve as a point of entry for malicious actors.

If these points of entry are not adequately protected, they will be vulnerable to cyberattacks that have negative consequences. These include but are not limited to operational disruptions, downtime, equipment malfunction, loss of access to equipment and data, theft of intellectual property and corporate secrets, and financial losses.

The bad news is that it’s not always easy for mining concerns to guard against such consequences. Operational technology (OT) networks and industrial control systems (ICS) that rely on IIoT devices may not be very well integrated with existing information technology (IT) structures. They may have been installed on legacy devices that lack appropriate traffic aggregation systems or require uni-directional connectivity. They may also be affected by differences in speed or media connections or reliance on switch SPAN ports that aren’t secure, reliable, or available in their specific environment.

Download Now ICS Visibility Guide: Utilities | Whitepaper


Mining security solutions designed to minimize risk and downtime

The good news is, it's certainly possible for mining companies to avoid or minimize risk, provided that they adopt the right cybersecurity solutions. The mining company teams we speak with often run down a security checklist that I thought may be useful:

  • Look for cybersecurity services at the same time you’re looking for cyber-physical equipment. Make cybersecurity and visibility part of the procurement process.
  • Try to identify potential problems ahead of by conducting vulnerability assessments. Carry these assessments out repeatedly and regularly so that you can prioritize the mitigation of attack paths to critical assets and procedures.
  • Look for cybersecurity solutions with real-time monitoring capabilities that allow you to detect adverse events – including but not limited to malware, malfunctioning devices, and neglected firmware updates – as they happen.
  • Go beyond real-time response by anticipating adverse events through practice and preparation. Proactive mitigation and predictive attack scenarios will make your security strategies stronger.
  • Make sure that your cybersecurity solutions offer operational visibility because you can’t secure what you can’t see. Choose a solution that offers a system inventory of all networked devices and ICS being monitored so that users can determine what facilities are connected to their networks and who is active on their networks.
  • Implement fundamental best practices in visibility architecture. Eliminate blind spots in your network so that ICS security tools can detect threats and anomalies and carry out continuous monitoring.


Visibility solutions for extreme environments

We recognize that natural resource extraction often takes place in extreme environments. After all, mining operations make regular use of explosives and some of the heaviest equipment in the world. They take place in settings where health and safety hazards are both ubiquitous and severe. As such, cyber-physical systems used in mining operations need to be rugged and physically durable, as well as robust in their defenses against cybercriminals. They must be able to withstand vibration, atmospheric contamination, and fluctuations in temperature and pressure conditions.

Garland takes these environment challenges seriously, as we understand what’s at stake. In the process of working with a contractor for the U.S. Department of Defense (DoD) to develop visibility solutions for extreme environments, we developed a military-grade industrial test-access point (TAP) that is designed to operate in the field and is vehicle mountable, with secure mighty mouse connections and power connectors for demanding conditions. Because packet visibility in extreme conditions can be mission critical.

Garland has also pioneered TAP visibility for extreme temperatures. These Copper OT breakout TAPs provide 100% full duplex traffic visibility and are engineered for temperature variations between -40C and +85C / -40F and +185F and are now being deployed across the globe.

That’s why, along with Garland’s rugged steel products, and high quality standard, the mining industry turns to Garland to ensure their security and monitoring solutions are able to see every bit, byte, and packet, even in the most extreme environments.

Looking to add visibility to your extreme environment, but not sure where to start? Try joining us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.

ICS Visibility Guide Utilities

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES