2019 IEEE Conference on Application, Information and Network Security (AINS) 2019
DOI: 10.1109/ains47559.2019.8968698
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Risk Assessment on Industry 4.0 using ICS testbed with AI and Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The Risk of Lack of Cybersecurity and Data Protection is characterized by the absence of security systems and programs for computers, networks, and software, which can result in a lack of protection of information and data in the company, facilitating access by malicious individuals [2,12,19,22,[29][30][31]35,42,58,69,71,72,77,84,85,110,112,117,122,127].…”
Section: Technological Risksmentioning
confidence: 99%
“…The Risk of Lack of Cybersecurity and Data Protection is characterized by the absence of security systems and programs for computers, networks, and software, which can result in a lack of protection of information and data in the company, facilitating access by malicious individuals [2,12,19,22,[29][30][31]35,42,58,69,71,72,77,84,85,110,112,117,122,127].…”
Section: Technological Risksmentioning
confidence: 99%
“…While Industry 4.0 provides a framework for integrating CPS for smart, flexible, and adaptive manufacturing, it carries with it concerns about cyber security. Indeed, the growth of IoT devices and CPS in networked production increases the surface of attacks on critical systems and infrastructures with damaging impacts on production processes [7,48]. In this research, different types of cyber-attacks presented by the authors of the selected studies are analyzed with their respective references:…”
Section: Steps Of the Search Processmentioning
confidence: 99%
“…Attackers exploit the attack intelligence to enhance the reach of their actions. They eliminate the geographic boundaries of their targets and minimize the evidence of their malicious activities [7].…”
Section: Introductionmentioning
confidence: 99%
“…The initial attack vectors could include the attacker's ability to compromise a device on the corporate network or an internet-exposed ICS component leveraging unpatched or a zero-day vulnerability [12]. Exploiting legitimate account credentials coupled with poorly designed or bypassed security controls, could enable the attacker to gain access to the ICS operational infrastructure [25]. We assume an attack vector where the attacker gains access to the logic control and the physical control layers.…”
Section: B Threat Modellingmentioning
confidence: 99%