What Risk Prevention Measures Can I Use?

2021 ◽  
pp. 104-131
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “What risk prevention measures can I use?” describes how to reduce the likelihood of a cyberattack on your organization. The chapter begins with a case study on the SolarWinds hack exemplifying how prevention measures on a specific system, network, or data cannot be effective on their own. The chapter describes why cyber risk management needs to be embedded across all facets of the organization, and how the Embedded Endurance strategy can help readers achieve that. It reviews system security prevention measures that include patch management and antivirus software. It explains network security prevention measures, including intrusion detection and intrusion prevention systems. The chapter also describes data risk prevention measures such as data governance, encryption, and data loss prevention technology, and highlights the importance of physical security for reducing cyber risk. The chapter concludes with Falco’s Embedded Endurance strategy insight on risk prevention gained at his industrial Internet-of-Things security company.

Author(s):  
Eva Masero Rubio ◽  
Pedro Miguel Baptista Torres ◽  
Rogério Pais Dionísio

This book chapter proposes a description of smart gateways and cyber-physical systems (CPS) for the industrial internet of things (I-IOT). It also presents a case study where a smart gateway is developed to be used in different types of industrial equipment for the shop floor. The case study is developed under the specifications of different industries in the region of Castelo Branco. It is a proof that the 4th industrial revolution will be the engine for SME innovation, independence of the regions and their financial strength. It is also proof that the cooperation between universities, industries and startups can evolve to break barriers and add value in the improvement of regional industries competitiveness. Topics that will be addressed on the chapter can be used for developers, students, researchers and enthusiasts to learn topics related to I-IOT, such as data acquisitions systems, wired and wireless communication devices and protocols, OPC servers and LabVIEW programming.


Author(s):  
Erdinç Koç

This chapter gives brief information about internet of things (IoT) and then detailed knowledge of industrial internet of things (IIoT). Internet of things applications can be seen in different areas, such as smart cars, smart homes, smart cities, agriculture, healthcare, industry, etc. This study focuses on the industrial part. Industrial internet of things (IIoT) means internet of things (IoT) applications for industrial usage. IIoT give a chance to enterprise for tracking supply chains, monitoring production line operations, and real-time consumption of energy, managing stock, and transportation decisions. This study used case study method for developing theory about IIoT's contribution to enterprise productivity. IIoT applications can be adapted to which operations of the enterprise, and how it will contribute to enterprise productivity is explained in this chapter. The chapter discusses the projects that are within the vision of IIoT but not yet implemented and concludes with suggestions for future studies.


Author(s):  
Jelena MALAHOVA ◽  
Daina VASIĻEVSKA ◽  
Karlis KETNERS

Flood risk management is the process of data and information gathering, risk analysis and evaluation, appraisal of options, and making, implementing and reviewing decisions to reduce, control, accept or redistribute the flood risks. It is a continuous process of analysis, adjustment and adaptation of policies and actions taken to reduce the flood risk. Preventive measures and timely, reasonable flood risk prevention measures can help reduce the risk of floods and caused damages. In addition, protection against floods is primarily necessary for populated areas, especially when it comes to densely populated areas, since floods may affect a large number of citizens and their property thereby causing enormous material damage not only to the inhabitants of these territories but also to business infrastructure, respectively, it can result in significant material and socioeconomic losses. The aim of the paper is to evaluate the flood risk management theoretical and practical aspects, identify the potential impact of floods on natural and socioeconomic environment, as well as to show the usefulness of flood risk reduction measures. To reach this aim, the following tasks must be fulfilled: to give the definitions of flooding and flood risk and briefly characterise the flooding and flood risk in Latvia; to study and characterize the flood risk management legal and institutional aspects; to carry out an analytical overview of the flood risk assessment on right bank of the Daugava River in Riga; to carry out a cost-benefit analysis of flood risk prevention measures on the right bank of the Daugava in Riga.


2021 ◽  
Vol 50 ◽  
pp. 101439
Author(s):  
Jia Ding ◽  
Maolin Wang ◽  
Xiong Zeng ◽  
Wenjie Qu ◽  
Vassilios S. Vassiliadis

2021 ◽  
pp. 204388692098616
Author(s):  
Dipankar Chakrabarti ◽  
Soumya Sarkar ◽  
Arindam Mukherjee

Owners of start-ups in the high-tech field face multiple challenges while scaling-up. The major challenge is to form a proper strategy that guides them to move from building products for point solutions to more industry-focused solutions, retaining skilled resources, efficient workforce management, and improving market reach. This case study is on Distronix, a start-up in the Industrial Internet of Things that could see steady revenue within 3 years of its operations. Distronix wanted to reach the next orbit fast. Distronix wanted to change the organizational blueprint with a proper strategy to scale-up. The young entrepreneurs owning Distronix brainstormed with their employees and the industry experts to strategize the next phase of growth. Market reach and coping with the changing demand of customers on Industrial Internet of Things were the two most important aspects of their strategy. After discussing with stakeholders and the mentors, the owners focused on alliances to increase their delivery and market reach capabilities. They could establish strong alliances, even with larger companies, with proper planning and sustained quality delivery. From the inception of Distronix, owners established alliance, but those were ad hoc and not as per the holistic plan, which provided them a better focus and guidance on alliancing. The alliance strategy seems successful from its revenue growth but needs regular review as the technology stack is getting refreshed fast. Regular monitoring of performance is also critical. The case study shows the importance of a well-thought and well-rounded alliance strategy for a start-up to scale-up confidently.


Author(s):  
Petar Radanliev ◽  
David Charles De Roure ◽  
Carsten Maple ◽  
Jason R.C. Nurse ◽  
Razvan Nicolescu ◽  
...  

In this paper we present an understanding of cyber risks in the Internet of Things (IoT), we explain why it is important to understand what IoT cyber risks are and how we can use risk assessment and risk management approaches to deal with these challenges. We introduce the most effective ways of doing Risk assessment and Risk Management of IoT risk. As part of our research, we also developed methodologies to assess and manage risk in this emerging environment.  This paper will take you through our research and we will explain: what we mean by the IoT; what we mean by risk and risk in the IoT; why risk assessment and risk management are important; the IoT risk management for incident response and recovery; what open questions on IoT risk assessment and risk management remain.


Sign in / Sign up

Export Citation Format

Share Document