Cyber security and Industry 4.0

2019 ◽  
Vol 67 (5) ◽  
pp. 361-363
Author(s):  
Jens Mehrfeld

Abstract “Stagnation is death“. This quote can be applied to two aspects. First, it is bad for a company if an outage occurs since then it cannot produce goods anymore and thus can make no more profit. Second, this quote can also refer to the developments leading to Industry 4.0. But what happens if technological progress creates more risks? The following article explores this issue with respect to IT security.

2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


Author(s):  
Petar Radanliev ◽  
Rafael Mantilla Montalvo ◽  
Razvan Nicolescu ◽  
Michael Huth ◽  
Stacy Cannady ◽  
...  

This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associated cyber risks for the Industry 4.0 (I4.0) sector. We report the results of a qualitative empirical study that correlates academic literature with 14 - I4.0 frameworks and initiatives. We apply the grounded theory approach to synthesise the findings from our literature review, to compare the cyber security frameworks and cyber security quantitative impact assessment models, with the world leading I4.0 technological trends. From the findings, we build a new impact assessment model of IoT cyber risk in Industry 4.0. We therefore advance the efforts of integrating standards and governance into Industry 4.0 and offer a better understanding of economics impact assessment models for I4.0.


SEEU Review ◽  
2020 ◽  
Vol 15 (1) ◽  
pp. 71-85
Author(s):  
Adrian Besimi ◽  
Visar Shehu

Abstract In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt new technologies. This paper aims to bridge together the needs for technology during the COVID-19 pandemics versus the security challenges that many forget to mention. The primary focus of this paper is to elaborate on the security challenges associated with technology with several examples from incidents around the world and from North Macedonia. As such, it represents a perspective paper with focus on current and emerging advances on IT security for running the “new normal” world.


2015 ◽  
Vol 5 (3) ◽  
pp. 19-27
Author(s):  
Rahul Rastogi ◽  
Rossouw von Solms

SCADA (Supervisory Control and Data Acquisition System) is a cyber-physical system, wherein IT (Information Technology) components work in conjunction with field devices to control a physical process. The security of these IT components becomes crucial in view of the damaging effects that any security breach of these IT components can have on the underlying physical process. In response to this critical issue, various governments across the world have recognized the issue of SCADA security and have initiated the creation of a regulatory framework for mandating SCADA security in their respective countries. This paper provides a brief overview of the cyber-security issues of SCADA and the implications of Stuxnet for SCADA security. The paper reviews the steps taken by the governments of India and South Africa; and it provides guidance to the owners of SCADA regarding SCADA security, as mandated by the Government of India.


2020 ◽  
Vol 9 (11) ◽  
pp. 213
Author(s):  
Alexey Tikhonov ◽  
Sergey Novikov ◽  
Vyacheslav Kalachanov ◽  
Umberto Solimene

The article examines the problem of the influence of the profession and industry of work of Russian applicants on their labor mobility. The general growth of labor mobility of the population is currently caused by several factors: change in the labor values of applicants, technological progress, desynchronization of the education sector and the labor market, growth of the economic crisis, etc. The main reasons prompting applicants to think about changing their current job in the article are the aspects of their relation to those professional areas and industries in which they are currently working or would like to work in the future. The authors analyzed the results of surveys of applicants of various ages and from various professional fields regarding their desire to change their profession (without taking into account the influence of the material factor), as well as their opinions regarding the most attractive professional fields for them. In addition, there are the opinions of applicants regarding the reasons prompting them to think about changing their profession. The article also examines data from interviews with applicants regarding their desire to move to work in a company from another industry.


Author(s):  
Edgar Weippl

This chapter outlines advanced options for security training. It builds on previous publications (Weippl 2005, 2006) and expands them by including aspects of European-wide cooperation efforts in security awareness. Various examples will show what characterizes successful programs. The authors cooperate with ENISA (http://www. enisa.eu.int/) to create a new multi-language awareness training program that uses virtual environments to allow users to train on real systems without any danger. We describe the design and the proposed implementation of the system. In cooperation with the Austrian Computer Society (http://www.ocg.at) we lay the basis for an ECDLmodule on IT security awareness training. Companies are obliged to reasonably secure their IT systems and user awareness training is one of the most important and effective means of increasing security. If claims are filed against a company, it is in the interest of management to provide proof that all users completed IT security training. Moreover, advanced and experienced users need a training environment that lets them try complex scenarios in a safe environment.


2020 ◽  
Vol 10 (14) ◽  
pp. 4942
Author(s):  
Lorenzo D’Orazio ◽  
Roberto Messina ◽  
Massimiliano M. Schiraldi

In the last decade, technological progress has profoundly influenced the industrial world and all industrial sectors have been confronted with a change in technological paradigms. In such a context, this study aims to analyze the synergies between the technological world of Industry 4.0 and the purely organizational and managerial domain of World Class Manufacturing, a model of Operational Excellence. The objective is relating the driving dimensions of the World Class Manufacturing (WCM) system to the technological macrocategories of Industry 4.0: this would allow the identification of which technological solution to leverage on, aiming at optimization in a given World Class Manufacturing pillar. The result is a “WCM-I4.0 matrix”: a proposal to reconcile, exploit and trace the relations between the two complex concepts. The WCM-I4.0 matrix includes, by now, 100 Industry 4.0 technologies that best suits with the World Class Manufacturing pillars.


Sign in / Sign up

Export Citation Format

Share Document