Engineering & Mining Journal

JUN 2014

Engineering and Mining Journal - Whether the market is copper, gold, nickel, iron ore, lead/zinc, PGM, diamonds or other commodities, E&MJ takes the lead in projecting trends, following development and reporting on the most efficient operating pr

Issue link: https://emj.epubxp.com/i/325596

Contents of this Issue

Navigation

Page 57 of 147

In addition to all of the usual financial and technical concerns associated with project development and mine operations, mineral producers today have to cope with another rapidly expanding and complex challenge: How to define, budget, and tailor security programs to protect assets from both exter- nal and internal threats. Whether it's as complex as detecting and fending off enterprise computer-network intruders, as potentially dangerous as thwart- ing property incursions by angry protestors or artisanal miners, or as basic as preventing pilferage of parts, supplies and tools by workers, it's a puzzle that must be solved— even though the most effective methods of protection may vary significantly from mine to mine, region to region, and by predomi- nant local cultural practices and beliefs. A typical project or mine site generally has numerous contractor and vendor employees entering and leaving the site on a daily basis, stores materials on site that attract the attention of thieves—and regula- tors—such as refined and highly valuable metals and explosives, and are increasingly located in remote areas in which the only infrastructure available is whatever the mine has itself installed to carry out production. Large producers such as BHP Billiton, Rio Tinto or Vale generally have the resources, budget and access to expert assistance that enable them to implement effective, enterprise-wide security practices and policies. For mid-level or smaller com- panies, however, security issues can involve uncomfortable decisions about how and when to expend limited resources to achieve basic levels of protection. Shareholders may be unhappy with noncore-business expendi- tures that don't contribute directly to output, but they may be even more displeased if lax attitudes toward security or uncontrolled activities on site cause bottom-line damage. Industry suppliers aren't exempt from security problems, either. Siemens, for example, is used to solving large-scale security problems for customers. However, even Siemens recently had to release a security update to counteract the "Heartbleed" software threat to its SIMAT- IC WinCC Open Architecture, a supervisory control and data acquisition (SCADA) sys- tem that's used in a large number of indus- tries. Heartbleed exploits a security flaw in software used by roughly two-thirds of all websites, and can be used to extract pass- words, encryption keys and other potential- ly sensitive information. This flaw also affects desktop and mobile applications, embedded systems like routers, hardware appliances and industrial control systems. Corporate security increasingly de- mands day-by-day or even hour-by-hour attention to data-delivery integrity as min- ing becomes more dependent on expert systems, autonomous operations and the Internet of Things in general. Recognizing the challenge—particularly to smaller enterprises—Siemens and McAfee, a divi- sion of Intel Security, also have teamed up to provide security solutions and services for industrial customers. They emphasized the fact that many industrial customers lack the resources necessary to respond efficiently to security incidents and do not have access to the global threat intelli- gence that would allow proactive defensive measures. This critical information is need- ed in order to keep up with evolving gov- ernment regulations, industry standards, sector specific best practices, and other risk information necessary for making informed business decisions. Siemens said cooperation with McAfee will complement its service offerings by leveraging security solutions such as next- generation firewall, security information and event management (SIEM), endpoint security, and global threat intelligence as part of its Managed Security Service, as well as offering professional services. GE, another large industry supplier, recently announced a new platform of industrial wireless routers that are designed to allow its mining customers to cost-effectively expand their communica- tion infrastructures securely, using a range of technologies. The MDS Orbit Platform is GE's next- generation wireless communications solu- tion that integrates cellular, private, licensed, and unlicensed networks in one device, delivering secure communication between field crews and industrial equip- ment, and bringing asset and operational data from the field to the operations cen- ter. GE said the MDS Orbit Platform's com- prehensive security framework provides customers the functions and tools they need to meet current cybersecurity require- ments and regulations. Offering -40°C to +70°C temperature ratings and a rugged, compact design, the 56 E&MJ; • JUNE 2014 www.e-mj.com S E C U R I T Y Taking Stock of Site Security Effective mine security requires preparation, awareness and prevention. Here's a look at some of the latest services and products that can help mine operators meet the challenge. Theft, intrusion and property damage are major mine security concerns, but there are economic issues, and ben- efits, as well. Some companies report reduced contractor costs simply from better access control information, showing who is actually on site and for how long. EMJ_pg56-57_EMJ_pg56-57 6/4/14 7:43 AM Page 56

Articles in this issue

Links on this page

Archives of this issue

view archives of Engineering & Mining Journal - JUN 2014