Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

When physical and digital worlds collide

By François Cortial, Chief Technology Officer, Mission-Critical Systems, Atos

At one point, the engineering world was binary, concerned with the designing and building of physical machines and structures. This is now blurred, with a digital profile that is changing the nature of engineering.

Cars are an excellent example of this changing profile, with Tesla CEO Elon Musk describing the Model S Tesla as a very sophisticated computer on wheels, back in 2015.

Previously, they were physical machines operating an engine and wheels and built by systems engineers; nowadays they have all the digital intricacies of a computer working in tandem with a physical machine. In the future, it is likely that cars will be closer to a computer in terms of build than the cars of previous generations. So how do we protect against security risks in an interconnected world, where the boundaries between physical and digital are becoming more and more blurred?

Cybersecurity as part of dependability

Critical infrastructure protection is key to guarantee dependability of our vital assets. For example, energy plants, emergency and health services and state services cannot afford any failure or disruption. For a long time, dependability was considered in system engineering with a physical- oriented mindset, alongside Reliability, Availability, Maintainability, Safety (RAMS). We are now talking about cyber-physical systems (CPS) and so fault, incident, attack areas are both physical and digital. Cybersecurity is now part of dependability, and the two topics must be addressed jointly (RAMS+S).

Both systems engineers and cybersecurity experts must consider dependability and risk but, so far, there is no common language between the two disciplines and crossover is still rare. The two separate experts must work together to design systems that are both physically and digitally secure.

Assembly robots in factories, turbines and flow control in energy plants, railroad switches and traffic systems in railway companies, are often networked with supervisory control and data acquisition systems (SCADA), sometimes through time sensitive networks (TSN) and over remote sites. Any failure or intrusion in such systems can lead to subsequent disruption of service, and at worst to catastrophic events or disasters.

It is also important to think about communication technologies. In fact, connectivity is an intrinsic part of the digital world, and any malfunction in this area can lead to complete end user service disruption. This is the case for all communication systems deployed for the operation of critical infrastructures or public safety. For example, any outage (either physical or digital) in an emergency management system at a region or country level can lead to critical impacts, including endangerment of human life.

Keeping pace with evolving technologies

In this major movement, new technologies and implementations are appearing, making the problem even more complex. Software defined approaches, virtualization of hardware, edge and fog computing and artificial intelligence (AI) driven applications are becoming the new normal. Furthermore, all these new trends must get along with old legacy systems that have not been designed with these emerging technologies in mind and cannot be renewed simply.

Finding a solution

Building a solution that encompasses people, processes and technology must be at the heart of all operations.
This means understanding both the physical and digital systems within the ecosystem and how they interact, and making security part of the culture of an organization and something everyone is responsible for.

Unfortunately, there is no perfect solution, and even less when complexity increases, reaching a system-of- systems level . Reaching operational safety within an acceptable risk profile can only be achieved by combining “by design” approaches and through continuous monitoring of the system during operation. Resilient systems that can automatically monitor themselves and flag any deviation from the expected quality of service and automatically apply countermeasures in an adaptive way.

At Atos, we would always recommend modern architectures, secured by design, and to set up collaborative mechanisms across different parts of a system. This is the best way to manage the risk of digital security incidents down to an appropriate level.

Unless security can be guaranteed to an appropriate level, complex systems such as autonomous cars cannot be used on a wide scale due to risk to life. Lack of security is a threat to technological progress.

The security of our fans and their physical and online environments is of the utmost importance to us. While more than 65,000 fans are excited for touchdowns, most are unaware thousands of technology devices in our stadium’s infrastructure must be protected from malicious intent by threat actors.

Kim Rometo

Vice President, Chief Information Officer,
Miami Dolphins and Hard Rock Stadium

Share this Page

By François Cortial, Chief Technology Officer, Mission-Critical Systems, Atos