2022
DOI: 10.34190/eccws.21.1.248
|View full text |Cite
|
Sign up to set email alerts
|

The Emergence of IIoT and its Cyber Security Issues in Critical Information Infrastructure

Abstract: The emergence of the Industrial Internet of Things (IIoT) can transform and improve industrial domain processes. This is achieved by IIoT’s ability to collect and process vast amounts of data using technology such as sensors. IIoT capabilities can improve the manufacturing processes of these sectors and contribute to the improved functioning of critical information infrastructure. In addition, current trends - such as the Fourth Industrial Revolution (4IR) - use IIoT to realise specific goals. While the emerge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The deployment of malicious software in edge computing environments and the unintentional disclosure or deletion of sensitive data are two examples of threats in this category. Training personnel to carry out their responsibilities appropriately and securely is one measure to prevent internal hazards (Bhaiyat and Sithungu, 2022). Another measure is behaviour analysis and risk profiling (Gaidarski and Minchev, 2021).…”
Section: Internal Threatsmentioning
confidence: 99%
See 3 more Smart Citations
“…The deployment of malicious software in edge computing environments and the unintentional disclosure or deletion of sensitive data are two examples of threats in this category. Training personnel to carry out their responsibilities appropriately and securely is one measure to prevent internal hazards (Bhaiyat and Sithungu, 2022). Another measure is behaviour analysis and risk profiling (Gaidarski and Minchev, 2021).…”
Section: Internal Threatsmentioning
confidence: 99%
“…Mitigation strategies include using Detection and Prevention Systems (IDPS) to detect and prevent network attacks (Parikh et 2019). Furthermore, systems in the edge computing environment should be isolated to avoid lateral movement by threat actors (Bhaiyat and Sithungu, 2022).…”
Section: Network Attacksmentioning
confidence: 99%
See 2 more Smart Citations