Advances in Wireless Communications and Networks
Volume 5, Issue 1, June 2019, Pages: 33-40
Received: Jul. 27, 2019;
Accepted: Sep. 6, 2019;
Published: Sep. 20, 2019
Views 76 Downloads 14
Pedro Ramos Brandao, Interdisciplinary Centre for History, Cultures and Societies, Evora University, Evora, Portugal
Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0.
Pedro Ramos Brandao,
Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0, Advances in Wireless Communications and Networks.
Vol. 5, No. 1,
2019, pp. 33-40.
Copyright © 2019 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/
) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
R. Rishi, “Ey-cybersecurity-for-industry-4-0,” 06 Setember 2019. [Online]. Available: https://www.ey.com/Publication/vwLUAssets/ey-cybersecurity-for-industry-4-0/$File/ey-cybersecurity-for-industry-4-0.pdf. [Acedido em 06 Setember 2019].
S. Wang, “Customized Encryption of CAD Models for Cloud-Enable Collaborative Product Development,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 35-57.
A. Wegner, “A New Approach to Cybersphysical Security in Industry 4.0,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 59-72.
G. Manogaran, “Big Data Security Intelligence for Healthcare Industry 4.0,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 103-126.
D. Glavach, “Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing (DDM) Systems,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 173-194.
Volkovlaw, “Volkov,” [Online]. Available: https://blog.volkovlaw.com/2018/01/convergence-cybersecurity-compliance-enterprise-risk-management.
C. Ventures, “Cybersecurity Ventures,” [Online]. Available: https://cybersecurityventures.com/cybersecurity-500.
Cbronline, “Cbronline,” [Online]. Available: https://www.cbronline.com/enterprise-it/5-unified-threat-management-products-to-simplify-your-cyber-security-4902562.
UGA, “UGA,” [Online]. Available: https://eits.uga.edu/access_and_security/infosec/pols_regs/policies/incident_management.
P. Identity, “Ping Identity,” [Online]. Available: https://www.pingidentity.com/en/company/blog/2017/08/14/what_is_identity_and_.
Empo Werit, “Empo Werit,” [Online]. Available: https://www.empowerit.com.au/blog/holistic-cybersecurity-7-layers-you-need-to-consider.
Small Business, “Small Business,” [Online]. Available: https://smallbusiness.chron.com/different-kinds-biometric-security-available-securing-server-room-69885.html.
Focustsi, “Focustsi,” [Online]. Available: https://info.focustsi.com/it-services-boston/the-8-layers-of-cybersecurity-needed-to-protect-your-business.
D. Guardian, “Digital Guardian,” [Online]. Available: https://digitalguardian.com/blog/what-data-encryption.
empowerit, “empowerit,” [Online]. Available: https://www.empowerit.com.au/blog/holistic-cybersecurity-7-layers-you-need-to-consider.
Unitedlayer, “unitedlayer,” [Online]. Available: https://www.unitedlayer.com/sites/default/files/ul-disasterrecoveryguide.pdf.
R. Nair, “The Resource Usage Viewpoint of Industrial Control System Security: An Inference-Based Intrusion Detection,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 195-223.
S. Tedeschi, “Practical Security Aspects of the Internet of Things,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 225-242.
L. Thames, “Cybersecurity for Industry 4.0 and Advenced Manufactoring Environments with Ensemble Intelligence,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 243-265.