SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
 
	
  
Industry	
  4.0	
  is	
  the	
  term	
  used	
  to	
  describe	
  the	
  fourth	
  industrial	
  revolution,	
  the	
  future	
  of	
  
industrial	
  production	
  based	
  on	
  the	
  “Internet	
  of	
  Things”.	
  Its	
  characteristics	
  include	
  a	
  high	
  
level	
  of	
  product	
  individualisation	
  and	
  an	
  ability	
  to	
  simultaneously	
  take	
  account	
  of	
  the	
  
requirements	
   of	
   dynamic	
   (high-­‐volume)	
   production.	
   Factories	
   are	
   turning	
   into	
   smart	
  
factories.	
  Processes	
  are	
  being	
  controlled	
  and	
  coordinated	
  in	
  real	
  time	
  across	
  national	
  
and	
   corporate	
   boundaries.	
   To	
   succeed,	
   it	
   will	
   require	
   the	
   standardisation	
   and	
  
modularisation	
   of	
   the	
   individual	
   process	
   steps	
   and	
   the	
   programming	
   of	
   virtually	
  
editable	
  models	
  of	
  these	
  modules.	
  Product	
  individualisation	
  enables	
  companies	
  in	
  many	
  
industries	
  to	
  produce	
  a	
  large	
  number	
  of	
  product	
  variants	
  at	
  low	
  cost,	
  and	
  in	
  doing	
  so,	
  to	
  
satisfy	
  individual	
  customer	
  needs.	
  Companies	
  can	
  react	
  flexibly	
  to	
  market	
  developments,	
  
to	
   rapid	
   changes	
   in	
   product	
   requirements	
   or	
   fluctuating	
   commodity	
   prices.	
   This	
   high	
  
level	
  of	
  adaptability	
  is	
  accompanied	
  by	
  an	
  improved	
  utilisation	
  of	
  production	
  capacities,	
  
whilst	
   the	
   flexible	
   management	
   of	
   resources	
   serves	
   to	
   improve	
   overall	
   operating	
  
efficiency.	
  More	
  accurate	
  calculations	
  mean	
  that	
  less	
  material	
  is	
  needed,	
  which	
  reduces	
  
inventory	
  and	
  manufacturing	
  costs.	
  
	
  
Industry	
   4.0	
   means	
   opportunities	
   and	
   challenges.	
   Integrating	
   the	
   concept	
   within	
   an	
  
organisation	
   means	
   opening	
   up	
   the	
   company’s	
   IT	
   infrastructure,	
   making	
   it	
   more	
  
susceptible	
  to	
  errors	
  and	
  more	
  vulnerable	
  to	
  attack.	
  Unfortunately,	
  intruders	
  will	
  not	
  
stop	
   trying	
   to	
   find	
   new	
   ways	
   of	
   breaking	
   into	
   business	
   networks.	
   Attacks	
   specifically	
  
designed	
   to	
   penetrate	
   industrial	
   control	
   systems	
   present	
   a	
   threat	
   to	
   production	
  
facilities.	
   Infected	
   computers	
   can	
   be	
   controlled	
   remotely	
   and	
   their	
   data	
   stolen.	
   Other	
  
linked	
   or	
   built-­‐in	
   devices	
   such	
   as	
   microphones,	
   keyboards	
   and	
   monitors	
   can	
   also	
   be	
  
spied	
   on.	
   As	
   the	
   malware	
   exploits	
   unknown	
   security	
   holes,	
   firewalls	
   and	
   network	
  
monitoring	
  software	
  are	
  unable	
  to	
  detect	
  it.	
  
	
  
Industry	
  4.0	
  =	
  Security	
  4.0?	
  
Risk	
  scenarios	
  
Scenario	
  1	
  
Attackers	
  install	
  malicious	
  programs	
  and	
  block	
  all	
  production	
  and	
  logistics	
  operations.	
  
Production	
  and	
  capacity	
  utilisation	
  data	
  are	
  inspected,	
  and	
  application	
  and	
  system	
  data	
  
manipulated.	
   In	
   a	
   worst-­‐case	
   scenario,	
   a	
   misdirected	
   machine	
   could	
   cause	
   physical	
  
damage	
  in	
  its	
  vicinity.	
  
	
  
Scenario	
  2	
  
Commands	
   to	
   industrial	
   robots	
   are	
   sent	
   via	
   embedded	
   systems,	
   which	
   are	
   usually	
  
connected	
  to	
  a	
  programmable	
  logic	
  controller.	
  The	
  control	
  components	
  are	
  linked	
  to	
  the	
  
Internet.	
  An	
  attacker	
  can	
  therefore	
  read	
  application	
  and	
  system	
  data,	
  install	
  data	
  packets	
  
designed	
  to	
  sabotage	
  the	
  production	
  lines,	
  related	
  systems	
  or	
  even	
  the	
  entire	
  corporate	
  
IT	
  infrastructure.	
  
	
  
Scenario	
  3	
  
Social	
  engineering:	
  attackers	
  exploit	
  human	
  characteristics,	
  such	
  as	
  helpfulness,	
  trust,	
  
curiosity	
   or	
   fear,	
   to	
   manipulate	
   employees	
   and	
   gain	
   access	
   to	
   data,	
   to	
   circumvent	
  
security	
  precautions	
  or	
  to	
  install	
  malicious	
  code	
  on	
  their	
  computers.	
  Their	
  objective	
  is	
  to	
  
spend	
  time	
  undisturbed	
  inside	
  the	
  company’s	
  network.	
  
	
  
	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
Akhil Kumar
 

Was ist angesagt? (20)

IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Pharmaceutical companies and security
Pharmaceutical companies and securityPharmaceutical companies and security
Pharmaceutical companies and security
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | Seclore
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Advantages of information technology in business
Advantages of information technology in businessAdvantages of information technology in business
Advantages of information technology in business
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 

Ähnlich wie Industrie 4.0-security-4.0

INDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENT
INDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENTINDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENT
INDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENT
Faga1939
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
Osama Shahumi
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
Aharon Aharon
 

Ähnlich wie Industrie 4.0-security-4.0 (20)

The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
THE FUTURE OF THE INDUSTRY
THE FUTURE OF THE INDUSTRY THE FUTURE OF THE INDUSTRY
THE FUTURE OF THE INDUSTRY
 
Industrial revolution4
Industrial revolution4Industrial revolution4
Industrial revolution4
 
INDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENT
INDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENTINDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENT
INDUSTRY 4.0 AND BRAZIL'S INDUSTRIAL DEVELOPMENT
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
threats
threatsthreats
threats
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
UNIT I S2.ppt
UNIT I S2.pptUNIT I S2.ppt
UNIT I S2.ppt
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 

Kürzlich hochgeladen

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 

Industrie 4.0-security-4.0

  • 1.     Industry  4.0  is  the  term  used  to  describe  the  fourth  industrial  revolution,  the  future  of   industrial  production  based  on  the  “Internet  of  Things”.  Its  characteristics  include  a  high   level  of  product  individualisation  and  an  ability  to  simultaneously  take  account  of  the   requirements   of   dynamic   (high-­‐volume)   production.   Factories   are   turning   into   smart   factories.  Processes  are  being  controlled  and  coordinated  in  real  time  across  national   and   corporate   boundaries.   To   succeed,   it   will   require   the   standardisation   and   modularisation   of   the   individual   process   steps   and   the   programming   of   virtually   editable  models  of  these  modules.  Product  individualisation  enables  companies  in  many   industries  to  produce  a  large  number  of  product  variants  at  low  cost,  and  in  doing  so,  to   satisfy  individual  customer  needs.  Companies  can  react  flexibly  to  market  developments,   to   rapid   changes   in   product   requirements   or   fluctuating   commodity   prices.   This   high   level  of  adaptability  is  accompanied  by  an  improved  utilisation  of  production  capacities,   whilst   the   flexible   management   of   resources   serves   to   improve   overall   operating   efficiency.  More  accurate  calculations  mean  that  less  material  is  needed,  which  reduces   inventory  and  manufacturing  costs.     Industry   4.0   means   opportunities   and   challenges.   Integrating   the   concept   within   an   organisation   means   opening   up   the   company’s   IT   infrastructure,   making   it   more   susceptible  to  errors  and  more  vulnerable  to  attack.  Unfortunately,  intruders  will  not   stop   trying   to   find   new   ways   of   breaking   into   business   networks.   Attacks   specifically   designed   to   penetrate   industrial   control   systems   present   a   threat   to   production   facilities.   Infected   computers   can   be   controlled   remotely   and   their   data   stolen.   Other   linked   or   built-­‐in   devices   such   as   microphones,   keyboards   and   monitors   can   also   be   spied   on.   As   the   malware   exploits   unknown   security   holes,   firewalls   and   network   monitoring  software  are  unable  to  detect  it.     Industry  4.0  =  Security  4.0?  
  • 2. Risk  scenarios   Scenario  1   Attackers  install  malicious  programs  and  block  all  production  and  logistics  operations.   Production  and  capacity  utilisation  data  are  inspected,  and  application  and  system  data   manipulated.   In   a   worst-­‐case   scenario,   a   misdirected   machine   could   cause   physical   damage  in  its  vicinity.     Scenario  2   Commands   to   industrial   robots   are   sent   via   embedded   systems,   which   are   usually   connected  to  a  programmable  logic  controller.  The  control  components  are  linked  to  the   Internet.  An  attacker  can  therefore  read  application  and  system  data,  install  data  packets   designed  to  sabotage  the  production  lines,  related  systems  or  even  the  entire  corporate   IT  infrastructure.     Scenario  3   Social  engineering:  attackers  exploit  human  characteristics,  such  as  helpfulness,  trust,   curiosity   or   fear,   to   manipulate   employees   and   gain   access   to   data,   to   circumvent   security  precautions  or  to  install  malicious  code  on  their  computers.  Their  objective  is  to   spend  time  undisturbed  inside  the  company’s  network.