Abstract
The information technology revolution (Industry 4.0) has led to the creation of the concept of cyber-physical systems. Digitalization has brought all the urgency of information security problems, which depend on the efficiency of modern production on targeted and random destructive impact, which lead to hidden, remote, and difficult to detect effects that can cause catastrophic consequences. The information security problems of cyber-physical systems require the development of a new security methodology. In this paper, it is proposed to interpret the security of cyber-physical systems as the preservation of the sustainable functioning of the cyber-physical system in the context of a targeted destructive impact on its information components. Cybersecurity methodology extends the objects of protection from data or key information to control systems as telecommunications equipment and actuators in the energy and manufacturing. This paper describes the process of transition from access control to cyber-defense for securing cyber-physical systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson, J. P. (1972). ‘Computer security technology planning study’. Electronic systems division, air force systems command. Bedford, MA: Hanscom Field.
Aström, K. J., & Murray, R.,. M. (2010). Feedback systems: An introduction for scientists and engineers. Princeton University Press.
Bellman, R. (2008). Stability theory of differential equations. Courier Corporation.
Bishop, M. (2003). Computer security: Art and science. Boston: Addison Wesley.
Calder, A. (2009). Information security based on ISO 27001/ISO 27002: A management guide–best practice. Hertogenbosch: Van Haren Publishing.
Chen, S., & Billings, S. A. (1989). Representations of nonlinear system: The NARMAX model. International Journal of Control, 49(3), 1013–1032.
Clayton, G. E. (2009). Data loss prevention and monitoring in the workplace: Best practice guide. Dallas, USA: Privacy Compliance Group, Inc.
Corin, R., Etalle, S., den Hartog, J., Lenzini, G., & Staicu, I. (2005). A logic for auditing accountability in decentralized systems. In T. Dimitrakos & F. Martinelli (Eds.), Formal aspects in security and trust. IFIP WCC TC1 2004. IFIP International Federation for Information Processing (Vol. 173). Boston, MA: Springer.
Gupta, A., Kuppili, P., Akella, A., & Barford, P. (2009). An empirical study of malware evolution. 2009 First International Communication Systems and Networks and Workshops.
Jasim, O. K., Abbas, S., & Salem, A. B. M. (2015). Evolution of an emerging symmetric quantum cryptographic algorithm. Journal of Information Security, 6, 82–91.
Kilian, C. T. (2006). Modern control technology: Components and systems. Thompson Delmar Learning.
Lacey, D. (2013). Advanced persistent threats: How to manage the risk to your business. ISACA.
Lavrova, D. S., Alekseev, I. V., & Shtyrkina, A. A. (2018). Security analysis based on controlling dependences of network traffic parameters by wavelet transformation. Automatic Control and Computer Sciences, 52(8), 931–935.
Pavlenko, E. Y., Yarmak, A. V., & Moskvin, D. A. (2017). Hierarchical approach to analyzing security breaches in information systems. Automatic Control and Computer Sciences, 51(8), 829–834.
Rattner, D. (2010). Risk Assessments. Security management. Boston: Northeastern University.
Rothman, M. (2010). Understanding and Selecting SIEM/Log Management. Securosis, Blog https://securosis.com/blog/understanding-and-selecting-siem-log-management-introduction
Stepanova, T. (2012). Ensuring sustainability of multi-agent protection systems under the impact of distributed security threats. Ph. D. Thesis, SPbSTU.
Zadorozhnyi, V. N., & Yudin, E. B. (2012). Structural properties of the scale-free Barabasi-Albert graph. Automation and Remote Control, 73(4), 702–716.
Zegzhda, D. P. (2016). Sustainability as a criterion for information security in cyber-physical systems. Automatic Control and Computer Sciences, 50(8), 813–819.
Zegzhda, P. D., Lavrova, D. S., & Shtyrkina, A. A. (2018). Multifractal analysis of internet backbone traffic for detecting denial of service attacks. Automatic Control and Computer Sciences, 52(8), 936–944.
Zegzhda, D. P., & Pavlenko, E. Y. (2017). Cyber-physical system homeostatic security management. Automatic Control and Computer Sciences, 51(8), 805–816.
Zegzhda, D. P., Poltavtseva, M. A., & Lavrova, D. S. (2017). Systematization and security assessment of cyber-physical systems. Automatic Control and Computer Sciences, 51(8), 835–843.
Zegzhda, P. D., & Zegzhda, D. P. (2001). Secure systems design technology. In V. I. Gorodetski, V. A. Skormin, & L. J. Popyack (Eds.), Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture notes in computer science (Vol. 2052). Berlin, Heidelberg: Springer.
Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. 2012 IEEE symposium on security and privacy (pp. 95–109).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Zegzhda, D.P. (2021). Convergent Evolution of IT Security Paradigm: From Access Control to Cyber-Defense. In: Devezas, T., Leitão, J., Sarygulov, A. (eds) The Economics of Digital Transformation. Studies on Entrepreneurship, Structural Change and Industrial Dynamics. Springer, Cham. https://doi.org/10.1007/978-3-030-59959-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-59959-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59958-4
Online ISBN: 978-3-030-59959-1
eBook Packages: Business and ManagementBusiness and Management (R0)