Advertisement

Overview of Cyber Security in the Industry 4.0 Era

  • Beyzanur Cayir ErvuralEmail author
  • Bilal Ervural
Chapter
Part of the Springer Series in Advanced Manufacturing book series (SSAM)

Abstract

The global development industry is in the midst of a transformation to meet today’s more complex and highly competitive industry demands. With the rapid advances in technology, a new phenomenon has emerged in the current era, Industry 4.0. The integration of information technology and operational technology brings newer challenges, especially cyber security. In this chapter, one of the most popular topics of recent times, cyber security issue, has been investigated. The occurrence of the Internet of Things (IoT), has also dramatically altered the appearance of cyber threat. Security threats and vulnerabilities of IoT, industrial challenges, main reasons of cyber-attacks, cyber security requirement and some cyber security measures/methods are discussed with a global perspective involving both the public and private sector in the IoT context.

References

  1. Abomhara M, Kien GM (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur 4:65–88CrossRefGoogle Scholar
  2. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36:93–101. doi: 10.1007/s10916-010-9449-4 CrossRefGoogle Scholar
  3. Ali I, Sabir S, Ullah Z (2016) Internet of things security, device authentication and access control: a review. Int J Comput Sci Inf Secur 14:456Google Scholar
  4. Appari A, Johnson ME (2010) Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag 6:279. doi: 10.1504/IJIEM.2010.035624 CrossRefGoogle Scholar
  5. BI Intelligence (2010) 10 data-security measures. Bus. Insid. DigitGoogle Scholar
  6. BI Intelligence (2015) The enterprise internet of things market—business insider. http://www.businessinsider.com/the-enterprise-internet-of-things-market-2015-7. Accessed 19 Jun 2017
  7. Capgemini (2015) Securing the internet of things opportunity: putting cybersecurity at the heart of the IoT | Capgemini WorldwideGoogle Scholar
  8. Chemringts (2014) The evolution of cyber threat and defence. UKGoogle Scholar
  9. Columbus L (2016) Roundup of internet of things forecasts and market estimates In: Forbes. https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#7eba4b9a292d. Accessed 20 Jun 2017
  10. Craig D (2016) Five cybersecurity challenges facing financial services organizations today. IBM Secur IntellGoogle Scholar
  11. Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10:2233–2243. doi: 10.1109/TII.2014.2300753
  12. Deloitte (2013) Risk angles—five questions on the evolution of cyber security. United KingdomGoogle Scholar
  13. Frost and Sullivan (2017) Cyber Security in the Era of Industrial IoT. Frost & Sullivan White Paper, GermanyGoogle Scholar
  14. Kaplan J, Weinberg A, Sharma S (2011) Meeting the cybersecurity challenge. Digit. McKinseyGoogle Scholar
  15. Kizza JM (2009) Guide to computer network security. Springer, BerlinGoogle Scholar
  16. Korolov M (2015) Healthcare organizations face unique security challenges | CSO Online. CSOGoogle Scholar
  17. Kumar SA, Vealey T, Srivastava H (2016) Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii international conference on system sciences (HICSS). IEEE, pp 5772–5781Google Scholar
  18. Li S (2017) Security requirements in IoT architecture. In: Securing the internet of things, pp 97–108Google Scholar
  19. McMillen D (2016) Attacks targeting industrial control systems (ICS) up 110 percent. IBMGoogle Scholar
  20. NATO Review (2013) The history of cyber attacks—a timeline. http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm. Accessed 20 Jun 2017
  21. Nibusiness (2017) Common cyber security measures. In: nibusinessinfo.co.uk. https://www.nibusinessinfo.co.uk/content/common-cyber-security-measures. Accessed 20 Jun 2017
  22. RISI (2015) RISI—the repository of industrial security incidents. http://www.risidata.com/Database/Detail/maroochy-shire-sewage-spill. Accessed 20 Jun 2017
  23. Rodosek GD, Golling M (2013) Cyber security: challenges and application areas. Springer, Berlin, pp 179–197Google Scholar
  24. Rüßmann M, Lorenz M, Gerbert P et al (2015) Industry 4.0: the future of productivity and growth in manufacturing industriesGoogle Scholar
  25. Sathish Kumar J, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90:20–26. doi: 10.5120/15764-4454
  26. Schneier B (2011) Secrets and lies : digital security in a networked world. Wiley, HobokenGoogle Scholar
  27. Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng 2017:1–25. doi: 10.1155/2017/9324035 CrossRefGoogle Scholar
  28. Sheikh S (2014) Evolving cyber security—a wake up call… In: Marsh National Oil Conference. DubaiGoogle Scholar
  29. Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 international conference on computer science and electronics engineering. IEEE, pp 648–651Google Scholar
  30. Taneja M (2013) An analytics framework to detect compromised IoT devices using mobility behavior. In: 2013 international conference on ICT convergence (ICTC). IEEE, pp 38–43Google Scholar
  31. Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 1–17. doi: 10.1007/s11277-017-4434-6
  32. Warren M, Hutchinson W (2000) Cyber attacks against supply chain management systems: a short note. Int J Phys Distrib Logist Manag 30:710–716. doi: 10.1108/09600030010346521 CrossRefGoogle Scholar
  33. WaterISAC (2015) 10 Basic cybersecurity measures—best practices to reduce exploitable weaknesses and attacksGoogle Scholar
  34. Weber RH, Studer E (2016) Cybersecurity in the internet of things: legal aspects. Comput Law Secur Rev 32:715–728. doi: 10.1016/j.clsr.2016.07.002 CrossRefGoogle Scholar
  35. Wendt H, Renn J (2012) Knowledge and science in current discussions of globalization. In: The globalization of knowledge in history. Edition Open AccessGoogle Scholar
  36. Yang D-L, Liu F, Liang Y-D (2010) A survey of the internet of things. In: Proceedings of the 1st International Conference on E-Business Intelligence (ICEBI2010). Atlantis PressGoogle Scholar
  37. Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd international conference on cloud computing. IEEE, pp 268–275Google Scholar

Copyright information

© Springer International Publishing Switzerland 2018

Authors and Affiliations

  1. 1.Department of Industrial Engineering, Faculty of ManagementIstanbul Technical UniversityMaçka, IstanbulTurkey

Personalised recommendations