Understanding IIoT Cybersecurity Issues

被引:0
|
作者
Branson, David J. [1 ]
机构
[1] Compliance Serv Grp Inc, Lubbock, TX 79424 USA
关键词
D O I
暂无
中图分类号
O414.1 [热力学];
学科分类号
摘要
Applying cybersecurity principles to the built environment often focuses on securing user access to building automation systems, an obvious area of concern. Similar application can secure the interface that connects equipment to the internet to facilitate machine-to-machine communication-often referred to as the Industrial Internet of Things (IIoT).(1) A cursory knowledge of this subject is important to give owners, engineers and technicians a user-level understanding of cybersecurity issues. After all, the development efforts mentioned in this column are being funded directly or indirectly by all of us. In a way, this means we are also funding cyber criminals.(2)
引用
收藏
页码:56 / 57
页数:2
相关论文
共 50 条
  • [21] ISSUES OF CYBERSECURITY OF THE PRODUCTION SYSTEM
    Maradova, K. A. R. L. A.
    Blecha, P. E. T. R.
    Blecha, R. A. D. I. M.
    Rozehnalova, J. A. N. A.
    Frkal, V. O. J. T. E. C. H.
    MM SCIENCE JOURNAL, 2022, 2022 : 6156 - 6161
  • [22] Temporal Understanding of Cybersecurity Threats
    Sleeman, Jennifer
    Finin, Tim
    Halem, Milton
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 115 - 121
  • [23] ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios
    Sklyar, Vladimir
    Kharchenko, Vyacheslav
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 1046 - 1049
  • [24] Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    APPLIED SCIENCES-BASEL, 2020, 10 (16):
  • [25] Understanding Cybersecurity Maturity in Practice
    Valavanis, Stel
    JOURNAL OF INFORMATION SYSTEMS, 2024, 38 (03) : 1 - 5
  • [26] Toward a Better Understanding of "Cybersecurity"
    Van Der Ham, Jeroen
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2021, 2 (03):
  • [27] Cybersecurity issues in industrial control systems
    Szabo, Zsolt
    2018 IEEE 16TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY 2018), 2018, : 231 - 234
  • [28] Cybersecurity Issues in Internet of Things and Countermeasures
    Al Ghadeer, Hoda
    2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INTERNET (ICII 2018), 2018, : 195 - 201
  • [29] eMaintenance in railways: Issues and challenges in cybersecurity
    Kour, Ravdeep
    Aljumaili, Mustafa
    Karim, Ramin
    Tretten, Phillip
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART F-JOURNAL OF RAIL AND RAPID TRANSIT, 2019, 233 (10) : 1012 - 1022
  • [30] Cybercrime and Cybersecurity Issues in the BRICS Economies
    Kshetri, Nir
    JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2015, 18 (04) : 245 - 249