| Peer-Reviewed

Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0

Received: 27 July 2019    Accepted: 6 September 2019    Published: 20 September 2019
Views:       Downloads:
Abstract

Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0.

Published in Advances in Wireless Communications and Networks (Volume 5, Issue 1)
DOI 10.11648/j.awcn.20190501.15
Page(s) 33-40
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cybersecurity, Industry 4.0, Networks Security, Networks Dangerous

References
[1] R. Rishi, “Ey-cybersecurity-for-industry-4-0,” 06 Setember 2019. [Online]. Available: https://www.ey.com/Publication/vwLUAssets/ey-cybersecurity-for-industry-4-0/$File/ey-cybersecurity-for-industry-4-0.pdf. [Acedido em 06 Setember 2019].
[2] S. Wang, “Customized Encryption of CAD Models for Cloud-Enable Collaborative Product Development,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 35-57.
[3] A. Wegner, “A New Approach to Cybersphysical Security in Industry 4.0,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 59-72.
[4] G. Manogaran, “Big Data Security Intelligence for Healthcare Industry 4.0,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 103-126.
[5] D. Glavach, “Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing (DDM) Systems,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 173-194.
[6] Volkovlaw, “Volkov,” [Online]. Available: https://blog.volkovlaw.com/2018/01/convergence-cybersecurity-compliance-enterprise-risk-management.
[7] C. Ventures, “Cybersecurity Ventures,” [Online]. Available: https://cybersecurityventures.com/cybersecurity-500.
[8] Cbronline, “Cbronline,” [Online]. Available: https://www.cbronline.com/enterprise-it/5-unified-threat-management-products-to-simplify-your-cyber-security-4902562.
[9] UGA, “UGA,” [Online]. Available: https://eits.uga.edu/access_and_security/infosec/pols_regs/policies/incident_management.
[10] P. Identity, “Ping Identity,” [Online]. Available: https://www.pingidentity.com/en/company/blog/2017/08/14/what_is_identity_and_.
[11] Empo Werit, “Empo Werit,” [Online]. Available: https://www.empowerit.com.au/blog/holistic-cybersecurity-7-layers-you-need-to-consider.
[12] Small Business, “Small Business,” [Online]. Available: https://smallbusiness.chron.com/different-kinds-biometric-security-available-securing-server-room-69885.html.
[13] Focustsi, “Focustsi,” [Online]. Available: https://info.focustsi.com/it-services-boston/the-8-layers-of-cybersecurity-needed-to-protect-your-business.
[14] D. Guardian, “Digital Guardian,” [Online]. Available: https://digitalguardian.com/blog/what-data-encryption.
[15] empowerit, “empowerit,” [Online]. Available: https://www.empowerit.com.au/blog/holistic-cybersecurity-7-layers-you-need-to-consider.
[16] Unitedlayer, “unitedlayer,” [Online]. Available: https://www.unitedlayer.com/sites/default/files/ul-disasterrecoveryguide.pdf.
[17] R. Nair, “The Resource Usage Viewpoint of Industrial Control System Security: An Inference-Based Intrusion Detection,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 195-223.
[18] S. Tedeschi, “Practical Security Aspects of the Internet of Things,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 225-242.
[19] L. Thames, “Cybersecurity for Industry 4.0 and Advenced Manufactoring Environments with Ensemble Intelligence,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 243-265.
Cite This Article
  • APA Style

    Pedro Ramos Brandao. (2019). Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Advances in Wireless Communications and Networks, 5(1), 33-40. https://doi.org/10.11648/j.awcn.20190501.15

    Copy | Download

    ACS Style

    Pedro Ramos Brandao. Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Adv. Wirel. Commun. Netw. 2019, 5(1), 33-40. doi: 10.11648/j.awcn.20190501.15

    Copy | Download

    AMA Style

    Pedro Ramos Brandao. Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Adv Wirel Commun Netw. 2019;5(1):33-40. doi: 10.11648/j.awcn.20190501.15

    Copy | Download

  • @article{10.11648/j.awcn.20190501.15,
      author = {Pedro Ramos Brandao},
      title = {Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0},
      journal = {Advances in Wireless Communications and Networks},
      volume = {5},
      number = {1},
      pages = {33-40},
      doi = {10.11648/j.awcn.20190501.15},
      url = {https://doi.org/10.11648/j.awcn.20190501.15},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20190501.15},
      abstract = {Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0.},
     year = {2019}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0
    AU  - Pedro Ramos Brandao
    Y1  - 2019/09/20
    PY  - 2019
    N1  - https://doi.org/10.11648/j.awcn.20190501.15
    DO  - 10.11648/j.awcn.20190501.15
    T2  - Advances in Wireless Communications and Networks
    JF  - Advances in Wireless Communications and Networks
    JO  - Advances in Wireless Communications and Networks
    SP  - 33
    EP  - 40
    PB  - Science Publishing Group
    SN  - 2575-596X
    UR  - https://doi.org/10.11648/j.awcn.20190501.15
    AB  - Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0.
    VL  - 5
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Interdisciplinary Centre for History, Cultures and Societies, Evora University, Evora, Portugal

  • Sections