JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for ACB-CLIN-CHEM-GEN Archives


ACB-CLIN-CHEM-GEN Archives

ACB-CLIN-CHEM-GEN Archives


ACB-CLIN-CHEM-GEN@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

ACB-CLIN-CHEM-GEN Home

ACB-CLIN-CHEM-GEN Home

ACB-CLIN-CHEM-GEN  2004

ACB-CLIN-CHEM-GEN 2004

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: Protecting process control computers: the summary

From:

Jonathan Kay <[log in to unmask]>

Reply-To:

Jonathan Kay <[log in to unmask]>

Date:

Mon, 11 Oct 2004 08:58:08 +0100

Content-Type:

multipart/alternative

Parts/Attachments:

Parts/Attachments

text/plain (188 lines) , text/enriched (257 lines)

And in this, just like in so many other ways, we're in the same
position as radiology:

http://www.e-health-insider.com/Features/articles.cfm?docID=65

Jonathan

On 14 Sep 2004, at 11:07, Jonathan Kay wrote:

>
> On 10 Aug 2004, at 11:57, Jonathan Kay wrote:
>
>> We have a vast number of computers used to control analysers, run
>> middleware etc. Many of these are PCs running Windows and are
>> therefore
>> vulnerable to viruses, trojans, worms etc. Increasingly these are
>> connected over LANs rather than serial lines.
>>
>> The key issues seem to be:
>> * Agreeing the responsibility for protection, patches etc between the
>> laboratory, the supplier and the local IT department.
>> * Not putting other software on these systems
>> * Not putting discs/ USB sticks etc into them without stringent
>> precautions
>> * Network issues, including firewalls
>>
>> How do others handle this?
>
> Here are the anonymised answers. I think the most useful things to do
> would be
> 1 Agree a Code of Conduct with suppliers
> 2 Continue to share experiences
>
> Jonathan
>
>
> ...............
>
> We are not allowed to put any software onto our PCs. Only our IT
> department
> with administrative rights can do this. It's very annoying at times,
> but we
> have avoided catching any major viruses etc. and as such, one can only
> support this policy.
> A similar comment re. USB sticks.
> Our network people are pretty hot on virus protection and firewalls.
> The major difficulty is the tripartite nature of the lab / IT / LIS
> supplier. It's rare to get all 3 around a table, and we find
> difficulty in
> ascertaining whose responsibility it is when we have problems. But
> that's a
> common scenario in most labs.
> We have only experienced one major problem with xxx in that last >5
> years.
> yyy made a (miniscule) change which brought us all to our knees (except
> BT which very sensibly is on a separate independent mini hub) without
> warning, as they thought that the change would not affect our day to
> day
> running. We filed an IR1, and have subsequently instituted a 3 way
> closed e
> mail group so that we can alert each other rapidly to forthcoming
> changes /
> work / updates etc. We hope in this way to be on the lookout for
> crashes,
> and perhaps more to the point, who to bollock when it all turns to mud
> (in a
> blame free culture, of course!)
>
>
> ............
>
> All these, exactly as you stated.  As computers are all networked, all
> get virus protection via network.  Network is well protected and most
> breaches appear to have been a breach of standing instructions.
>
> Unauthorised surfing is logged and certain staff have received
> warnings about their activities.
>
> I don't think we have had any instructions on USB sticks but they are
> similar to floppies.
>
> All dial in (for out-of-hours authorisation) is via a strong
> authentication server which can be a pain but does seem to be secure -
> there is muttering about VPN but we can't afford it yet and it means
> the home PC must be secure as well (instead of just running a terminal
> emulator).
>
> The one thing they haven't covered is trojans and nasties via the
> internet.  They may be creamed by the firewall but I had a sudden
> increase in junk mail when I visited one site suggesting I have
> something on my disc.  I can't use the cleaners (adaware, pestscan,
> spybot etc) as they require administrator rights that I don't have and
> the IT dept are run ragged as it is, without dealing in minor
> nuisances.
>
> Its a bit big-brotherish but it does seem to work.
>
>
>
> .................
>
> We have recently had a problem as you describe with our xxx Interface
> which succumbed to one of the Trojan worm viruses. The PC was supplied
> with Windows 2000 but automatic Windows update was turned off by
> default. It was also recommended that updates should be manually run
> so that the IM software was logged of and backed up before running the
> update. Unfortunately this detail had been overlooked and the
> networked machine was infected. We had previously used PGP interfaces
> that ran DOS software and has not encountered this problem before.
>
> We are presently replacing some equipment and I have found that the
> manufacturers have moved towards Windows 2000 or NT application
> software with networked interfacing. Previously most of our analysers
> tended to use specialised process control operating systems for
> running the machines even when they had a windows look-a-like screen
> presentation. I have asked if the manufacturers now offer any guidance
> for maintaining security but have yet to receive a reply. I am not
> aware that the suppliers preload any anti-virus software on the
> analyser PCs, or that they ensure that it is regularly updated.
>
> The problem is not only limited to the risk of infection by loading
> disks locally but by the overall issue of infection of any PC within
> the hospital, inside the firewall, or by staff connecting laptops to
> the network that may have been used elsewhere, both offer routes for
> malicious infection.
>
> Regards,
>
> .............
>
> With difficulty -  In some cases we build subnets behind switches
> otherwise we insist on full virus protection. Where companies don't
> know
> how to deal with it we make them come back with viable solutions often
> involving buffer PCs to isolate off the systems which can't handle the
> protection. Most companies do not understand mixed multipurpose
> networks
> and assume the have full network access and bandwidth. They need to
> wise
> up and fast.
>
>
>
> ..................
>
>
> I would agree with Jonathan's suggestions and add the following:
>
> - try and avoid the Windows OS if possible: Unix is potentially much
> easier to secure and more stable
>
> - always install a secure subset of the OS, and get someone who really
> knows to help with this
>
> - as part of the above turn off all ports and services not specifically
> required for the control tasks
>
> - do NOT install software such as browsers unless required to prevent
> accidental contamination
>
> - remember the biggest risk may be from other computers on the local
> network getting infected and flooding the local network with
> broadcasts,
> and that their security or lack of it is outside your control (we speak
> from experience!)
>
> - to avoid this ensure your control systems are isolated from the rest
> of
> the hospital network by a local firewall: we have to implement this in
> Medical Physics to protect our linear accelerator control systems and
> the
> threat is very real

------ACB discussion List Information--------
This is an open discussion list for the academic and clinical
community working in clinical biochemistry.
Please note, archived messages are public and can be viewed
via the internet. Views expressed are those of the individual and
they are responsible for all message content.

ACB Web Site
http://www.acb.org.uk
List Archives
http://www.jiscmail.ac.uk/lists/ACB-CLIN-CHEM-GEN.html
List Instructions (How to leave etc.)
http://www.jiscmail.ac.uk/

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000
1999
1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager