Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0.
Published in | Advances in Wireless Communications and Networks (Volume 5, Issue 1) |
DOI | 10.11648/j.awcn.20190501.15 |
Page(s) | 33-40 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2019. Published by Science Publishing Group |
Cybersecurity, Industry 4.0, Networks Security, Networks Dangerous
[1] | R. Rishi, “Ey-cybersecurity-for-industry-4-0,” 06 Setember 2019. [Online]. Available: https://www.ey.com/Publication/vwLUAssets/ey-cybersecurity-for-industry-4-0/$File/ey-cybersecurity-for-industry-4-0.pdf. [Acedido em 06 Setember 2019]. |
[2] | S. Wang, “Customized Encryption of CAD Models for Cloud-Enable Collaborative Product Development,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 35-57. |
[3] | A. Wegner, “A New Approach to Cybersphysical Security in Industry 4.0,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 59-72. |
[4] | G. Manogaran, “Big Data Security Intelligence for Healthcare Industry 4.0,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 103-126. |
[5] | D. Glavach, “Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing (DDM) Systems,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 173-194. |
[6] | Volkovlaw, “Volkov,” [Online]. Available: https://blog.volkovlaw.com/2018/01/convergence-cybersecurity-compliance-enterprise-risk-management. |
[7] | C. Ventures, “Cybersecurity Ventures,” [Online]. Available: https://cybersecurityventures.com/cybersecurity-500. |
[8] | Cbronline, “Cbronline,” [Online]. Available: https://www.cbronline.com/enterprise-it/5-unified-threat-management-products-to-simplify-your-cyber-security-4902562. |
[9] | UGA, “UGA,” [Online]. Available: https://eits.uga.edu/access_and_security/infosec/pols_regs/policies/incident_management. |
[10] | P. Identity, “Ping Identity,” [Online]. Available: https://www.pingidentity.com/en/company/blog/2017/08/14/what_is_identity_and_. |
[11] | Empo Werit, “Empo Werit,” [Online]. Available: https://www.empowerit.com.au/blog/holistic-cybersecurity-7-layers-you-need-to-consider. |
[12] | Small Business, “Small Business,” [Online]. Available: https://smallbusiness.chron.com/different-kinds-biometric-security-available-securing-server-room-69885.html. |
[13] | Focustsi, “Focustsi,” [Online]. Available: https://info.focustsi.com/it-services-boston/the-8-layers-of-cybersecurity-needed-to-protect-your-business. |
[14] | D. Guardian, “Digital Guardian,” [Online]. Available: https://digitalguardian.com/blog/what-data-encryption. |
[15] | empowerit, “empowerit,” [Online]. Available: https://www.empowerit.com.au/blog/holistic-cybersecurity-7-layers-you-need-to-consider. |
[16] | Unitedlayer, “unitedlayer,” [Online]. Available: https://www.unitedlayer.com/sites/default/files/ul-disasterrecoveryguide.pdf. |
[17] | R. Nair, “The Resource Usage Viewpoint of Industrial Control System Security: An Inference-Based Intrusion Detection,” em Cybersecurity for Industry 4.0, Cham, Spinger, 2017, pp. 195-223. |
[18] | S. Tedeschi, “Practical Security Aspects of the Internet of Things,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 225-242. |
[19] | L. Thames, “Cybersecurity for Industry 4.0 and Advenced Manufactoring Environments with Ensemble Intelligence,” em Cybersecurity for Industry 4.0, Cham, Springer, 2017, pp. 243-265. |
APA Style
Pedro Ramos Brandao. (2019). Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Advances in Wireless Communications and Networks, 5(1), 33-40. https://doi.org/10.11648/j.awcn.20190501.15
ACS Style
Pedro Ramos Brandao. Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Adv. Wirel. Commun. Netw. 2019, 5(1), 33-40. doi: 10.11648/j.awcn.20190501.15
AMA Style
Pedro Ramos Brandao. Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0. Adv Wirel Commun Netw. 2019;5(1):33-40. doi: 10.11648/j.awcn.20190501.15
@article{10.11648/j.awcn.20190501.15, author = {Pedro Ramos Brandao}, title = {Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0}, journal = {Advances in Wireless Communications and Networks}, volume = {5}, number = {1}, pages = {33-40}, doi = {10.11648/j.awcn.20190501.15}, url = {https://doi.org/10.11648/j.awcn.20190501.15}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20190501.15}, abstract = {Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0.}, year = {2019} }
TY - JOUR T1 - Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0 AU - Pedro Ramos Brandao Y1 - 2019/09/20 PY - 2019 N1 - https://doi.org/10.11648/j.awcn.20190501.15 DO - 10.11648/j.awcn.20190501.15 T2 - Advances in Wireless Communications and Networks JF - Advances in Wireless Communications and Networks JO - Advances in Wireless Communications and Networks SP - 33 EP - 40 PB - Science Publishing Group SN - 2575-596X UR - https://doi.org/10.11648/j.awcn.20190501.15 AB - Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0. VL - 5 IS - 1 ER -