The Cyber Threats Analysis for Web Applications Security in Industry 4.0

Author(s):  
Anna Sołtysik-Piorunkiewicz ◽  
Monika Krysiak
Author(s):  
Konstantinos Tsiknas ◽  
Dimitrios Taketzis ◽  
Konstantinos Demertzis ◽  
Charalabos Skianis

In today’s Industrial IoT (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities, the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions against these attacks, as they have been proposed in the most recent literature.


2020 ◽  
Vol 12 (21) ◽  
pp. 9179
Author(s):  
Sidi Boubacar ElMamy ◽  
Hichem Mrabet ◽  
Hassen Gharbi ◽  
Abderrazak Jemai ◽  
Damien Trentesaux

A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.


2020 ◽  
Vol 2 (1) ◽  
pp. 349-356
Author(s):  
Wojciech Gliń ◽  
Renata Stasiak-Betlejewska

AbstractCurrently, the industry is called as Industry 4.0, Internet of Things, Industrial Internet of Things, where devices, machines, information, organizations and people are connected to the network. Every day meet new solutions for Industry 4.o can be met, but in parallel with these solutions there are also threats in the field of security of industrial networks. Such threats have been called cyber-attacks or cyber threats. Cybersecurity is the global name of a field aimed at counteracting all types of threats on the web. Cybersecurity is to raise awareness, inform, control and introduce solutions to counteract cyber threats. Enterprises, organizations dealing with the promotion of Industry 4.0, IoT, IIoT, form the appropriate groups, departments, companies whose goal is to counteract all types of cyber-attacks. At present, the thesis can be formulated that cybersecurity of the broadly understood network is more important than the implementation of Industry 4.0. The publication will attempt to present the threats that cybersecurity enterprises must face and the ways and methods to counter them.


2021 ◽  
Vol 9 (2) ◽  
pp. 477-492
Author(s):  
Tarun Dhar Diwan, Et. al.

Network protection includes of the strategies and procedures implemented in this paper to avoid and monitor intrusion attempts, infringement, manipulation or violation of a computer system and services accessed by the network. Network protection applies to the different countermeasures put in place to secure or flow through the network and data collected on or through it. Protection for web applications is the method of securing websites and internet resources from multiple security attacks that target weaknesses in an application. Security for web apps is a data management division that primarily deals with the security of websites, web applications and web services. Risks to cyber security include a broad range of allegedly criminal practices on the web. For years, computer security risks against utility assets were identified, cyber-attacks arising from the exploitation of data device weaknesses by unauthorized access users This study is a cyber infrastructure assault, vulnerability and vulnerabilities, including hardware and software devices, networks, business networks, intranets, and cyber intrusion usage. Only big organisations are at risk of cyber-attacks, a widespread misunderstanding. Even then, the targeting of small and medium sized enterprises has seen a large improvement. This is since less-sophisticated cyber defence mechanisms appear to be used by these smaller organisations. As many as 50% of all cyber-attacks hit small companies, wasting $200,000 on average, sufficient to get out of business for less-established entities. an enterprise-grade protection device and awareness of the various forms of cyber threats facing corporations in 2025 to safeguard company from hacking attacks. fight cyber threats successfully and decrease the exposure of enterprise.  


2019 ◽  
Vol 8 (4) ◽  
pp. 1552-1556

In recent years, utilization of web applications, web hacking exercises have grown exponentially. Organizations are confronting extremely critical difficulties in anchoring their web applications from rising cyber threats, as bargain with the assurance issues don't appear to be the right approach. Vulnerability Assessment and Penetration Testing (VAPT) methods help us find these vulnerabilities / security loopholes in our systems even before an intruder could find a way to get it. This helps avoid zero-day exploits. This paper aims to elucidate the overview of Vulnerability Assessment and Penetration Testing and introduce the most efficient open source tools used to perform these tests. This paper also presents a combined VAPT testing methodology that incorporates strengths of several existing approaches, with the goal to understand their utility and benefit the most from the tests.


Author(s):  
Savo Stupar ◽  
Emir Kurtović ◽  
Mirha Bičo Ćar

In the last ten years, three new information technologies have emerged, representing the realization of old (by the time of emergence) theoretical concepts, but new in creativity and innovation, as well as incredible potential for the realization of revolutionary ideas and changes in all areas of human activity, which by one name they call 4th Industrial Revolution or Industry 4.0. They are: Big Data Analytics technology, Cloud Computing and Blockchain technology. Each of them individually represents the realization of new paradigms of computer data processing, which could not be practically implemented until the development of information and communication technologies, especially the Internet, Web applications, new operating systems, network technologies, mobile telephony, technologies of advancement of hardware performances, internet of things, etc. The primary aim of this paper is to get acquainted with the characteristics of these technologies and their potentials, their advantages and disadvantages in relation to traditional technologies, identification of areas and ways of their both current and future applications. The ultimate goal is to explain the incredible potential of these technologies, creating the foundation for their combined application in the creation of new Industry 4.0 products, which should result in a synergistic effect.


2019 ◽  
Vol 957 ◽  
pp. 348-357
Author(s):  
Gabriel Raicu ◽  
Alexandra Raicu

Industry 4.0 era, as a whole, when economical entities not need to worry only about the classical business issues like natural disasters, asymmetrical competition, loss of key employees, among others, will be faced with increasingly sophisticated cyber threats targeting critical infrastructure as well as the smart devices that we use to control them virtually. Modern technology is prone to vulnerabilities that can be exploiting to get into targeted networks. Any connected system or industrial robot can easily be scanned for vulnerabilities that can be exploited and lead to the production of defective goods. As a paradox of this society, the future of Polymeric and Composites Materials and of related infrastructure will be based on high degree of automation – despite all associated cyber risks. Moreover, the blue efficiency paradigm will be based on increased role of IT and AI tools that will push the cyber risks even further. The paper will address the cyberspace constraints and corresponding solutions applied to Polymeric and Composites Materials paradigm.


IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 163-186
Author(s):  
Konstantinos Tsiknas ◽  
Dimitrios Taketzis ◽  
Konstantinos Demertzis ◽  
Charalabos Skianis

In today’s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities and the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature.


Author(s):  
Ravdeep Kour ◽  
Mustafa Aljumaili ◽  
Ramin Karim ◽  
Phillip Tretten

The convergence of information technology and operation technology and the associated paradigm shift toward Industry 4.0 in complex systems, such as railways has brought significant benefits in reliability, maintainability, operational efficiency, capacity, as well as improvements in passenger experience. However, with the adoption of information and communications technologies in railway maintenance, vulnerability to cyber threats has increased. It is essential that organizations move toward security analytics and automation to improve and prevent security breaches and to quickly identify and respond to security events. This paper provides a statistical review of cybersecurity incidents in the transportation sector with a focus on railways. It uses a web-based search for data collection in popular databases. The overall objective is to identify cybersecurity challenges in the railway sector.


Sign in / Sign up

Export Citation Format

Share Document