You are on page 1of 6

Industrial CyberSecurity 4.

0 : Preparing the
Operational Technicians for Industry 4.0
 
  Konstantinos Karampidis Spyros Panagiotakis Manos Vasilakis
  Department of Information & Department of Electrical & Department of Electrical &
  Communication Systems Computer Engineering Computer Engineering
Engineering Hellenic Mediterranean University Hellenic Meditertanean University
  University of the Aegean Heraklion, Crete, Greece Heraklion, Crete, Greece
  Samos, Greece spanag@hmu.gr mtp187@edu.teicrete.gr
  karampidis@aegean.gr
  Giorgos Papadourakis
  Evangelos K. Markakis Department of Electrical &
  Department of Electrical & Computer Engineering
  Computer Engineering Hellenic Mediterranean University
  Hellenic Mediterranean University Heraklion, Crete, Greece
  Heraklion, Crete, Greece papadour@cs.teicrete.gr
  markakis@pasiphae.eu
 
  I. INTRODUCTION
  Abstract— In the context of Industry 4.0, industrial The project InCyS 4.0 (Industrial CyberSecurity 4.0)
  facilities are connected to corporate data networks and [1], co-funded by the Erasmus+ Programme of the
are frequently administered remotely over the European Union, aims to offer open source course
 
Internet. However, these new technologies have materials and Higher Education (HE) training to fill the
 
brought new threats into the world of industrial evident gap in awareness and competence in cyber
 
automation, since the Industrial Control Systems (ICS) security for operational technicians in Industry 4.0. In the
 
in place today were designed to operate for decades, modern automated industrial landscape of digitally
 
and many of them were developed without any serious connected control systems, new risks [2] abound for which
  industrial employers should become aware of. The
regard to IT security. Hence, the modern labor market
  industrial labor market needs technicians and engineers
in the industry needs trained technicians and engineers
  capable to identify potential cybersecurity threats and who are aware of the cyber risks and dangers and who can
  able to respond adequately when an attack is respond adequately or minimize the risk when detected.
  identified. Personnel training in these skills is costly, as The present curricula need to incorporate practical
  experienced and skilled trainers are required for an preparation in these issues for all technicians and
  ever-changing technological environment. In this engineers who will come into contact with industrial
  control systems (ICS). Typically, the operation of an ICS,
context, InCyS 4.0 (Industrial CyberSecurity 4.0) is a
  could be interrupted by an operator error or a failure at a
2-year KA2 project co-funded by the Erasmus+
  production unit. Nowadays that production units are
programme of the European Union, that aims to create connected to Internet, cyberattacks are becoming more
  open source educational material to address training
  often [3], especially in the last decade. In 2007, a former
of industrial production technicians for handling employee of Tehama Colusa Canal Authority (TCCA)
  cyber-security vulnerabilities. In order InCyS4.0 to installed unauthorized software on a computer used to
  assure that the developed training material fits the divert water from the Sacramento River for irrigation
  needs of European Industries, it conducted a field purposes. This software infected supervisory control and
  research in every partner country. Field research had data acquisition system (SCADA). It caused a denial of
  the form of an anonymous questionnaire targeting the service and although the damage was limited, it is a good
  IT personnel of local industries. Aim of the research paradigm how an administrator negligence (forgot to
  was the investigation of the security weaknesses of the revoke rights of the former employee) can cause damage
  participating enterprises and the extraction of the to an industry. In 2011 a cyberattack was reported; the so-
  profile of the industrial IT engineers, so the project called Night Dragon Operation. It was found that it started
  adapts the training content to the feedback. This paper in mid-2006 and hit over 70 organizations, businesses
  describes the rationale, aims and objectives of the worldwide, the United Nations and the International
  project, presents the outcomes of the research and Olympic Committee. More recent attacks [4][5][6]
  outlines the proposed course material. concern ransomware, where attackers gain control to
  victims resources and encrypt data demanding ransom
Keywords — cybersecurity, operational technicians, payments in cryptocurrency.
 
  personnel training, operational technology, industry 4.0, These few paradigms of cyberattacks show that ICS
  education systems can be easily compromised and attackers can hit
  at the different layers of ICS architecture i.e. a) the
 

978-1-7281-1016-5/19/$31.00 ©2019 IEEE


hardware layer b) the firmware layer and c) the software efficiency, process performance and commercial
Layer [7]. Moreover, the integration of the Operational competitiveness. However, the introduction of IT and
Technology (OT) and the Information Technology (IT) digital supply networks (DSNs) into automated systems
make industries more vulnerable to cyber-attacks. IT/OT means that data is now shared among a large number of
integration is the end state where instead of a separation of applications, and machinery is operated using global
IT and OT as technology areas with different areas of applications and network systems. The benefits of the use
authority and responsibility, there is integrated process of digital technology for operations are enormous but
and information flow. A critical factor that boosted OT come with new and increased risks. There is a real threat
and IT convergence is the industrial Internet of Things to companies’ production security, safety and capacity, as
(IIoT). In the past, OT and IT had different objectives. IT well as data privacy, when companies connect to
was focused to the business applications, while OT was operational technology networks. Companies admit to
dedicated solely on the manufacturing process. being unprepared for the array of cyber threats now
Collaboration was not established due to different distinguishable. "As the complexity and sophistication of
technology or different networks. Recently OT has started attacks increase, it is becoming increasingly difficult to
to adopt IT technologies. For example, Internet Protocol find the highly skilled cybersecurity talent needed to
(IP) is used as an all-purpose networking protocol and design and implement secure, vigilant, and resilient cyber
common operating systems (e.g. Windows) is frequently security solutions" [8].
found in many devices. The integration of OT and IT
benefits companies by reducing cost and risks along with Operational technicians in industrial companies are
higher performance and gains in flexibility. The not sufficiently aware of the threats nor do they have the
advantages of an OT/IT convergence are: competences to take adequate preventive security or
response measures. InCyS 4.0 comes to fill this
• Cost knowledge gap and help industries to confront the new era
• For IT, cost is about demonstrating and risks. InCyS 4.0 proposes the creation of an integrated
predicting profitability. For OT, cost is reduced training course for high level technicians (EQF level 5 and
of production expenses. For both, improving above) and operational workers who work or will work in
costs positively impacts the organization. Industry, in critical infrastructures or in industrial
• Performance - Productivity production. Automated industrial production services and
• Agility machinery are potential targets for hacking, sabotage, theft
• Improved production timelines that makes room and chaos. The project strengthens co-operation between
for innovation, something that was difficult education, research and industry by offering more
within different OT and IT environments. attractive and effective education in the form of high-
quality learning opportunities that improve technical skills
The major disadvantage is that the integration of the and meet the needs of employers in an evolving labor
two environments highlights each company’s security market.
gaps. Therefore, the need of taking countermeasures is
becoming compulsory. Countermeasures can be taken in II. METHODOLOGY
all layers of the ICS architecture or computer networks Industrial operational security is a pressing issue for
(IT) but the most critical part is the training of the Industry 4.0 throughout Europe. The RiS3 (Regional Smart
personnel. A 2016 Deloitte-MAPI study [8] found that 75 Specialization Strategies) [9] highlights the urgent need to
percent of executives surveyed believed they lacked the prepare Industry 4.0 establishments for cyber security
skilled talent resources needed to effectively implement attacks. While new waves of Artificial Intelligence and
and maintain a secure connected production ecosystem. cyber security packages can be purchased, technical
While not all technicians will be responsible for operations workers´ need to be better prepared as they are
implementing cyber security, all technical operators and often the weakest link in the security chain. By working
supervisors using CNC/PLCs in automated systems, transnationally, the necessary educational initiative for
robotics, electronic maintenance, I.T etc. need to be aware industrial security training can be condensed, reducing
of the risks and realities of ICSs and have the knowledge costs for smaller industrial companies (SMEs) in Europe
to implement preventive measures and solutions. To which make up for a significant proportion of the 99% of
prepare actual and future technicians and engineers all enterprises in the nonfinancial business sector in the
adequately in these high-quality skills and competences EU28. It can also contribute to a representative educational
related to the modern industrial landscape is of utmost offer and to greater and more effective cooperation
relevance and importance. between Education and Industry.
In 2013 the German Prime Minister A. Merkel In this context, the InCyS 4.0 consortium comprises
declared the beginning of a new industrial revolution – partners from Greece, Portugal and Spain and unites higher
Industry 4.0. The new paradigm in Industry is based on education institutions, a VET organization offering
increased automation, more flexible and efficient training for high level VET (Vocational Education and
production involving Industrial Control Systems (ICS). Training) and a consultancy enterprise. They are all
Europe is looking to Industry 4.0 – or the Digital collaborate with industrial enterprises in their networks
Transformation of Industry – as the opportunity to lead the (especially Small and medium-sized enterprises - SMEs)
world in technological transformation and prosperity. from the very beginning. The project strengthens the
By now automation and digital control is well “knowledge triangle” and collaboration between
underway in industrial operations due to its high Education, Research and Industry, to offer more attractive
and effective education in the shape of high-quality - Employees are usually allowed (70%) to bring
learning opportunities which improve employability and their own devices at work, although the use of
also meet employer needs in the evolving work market. their personal computers is prohibited.
They will all benefit from collaborating towards the
developed innovation in cyber security training (essential Q7. Do you implement any scheduled awareness briefing
for OT - operational technology). Training for staff in for the operators on security themes like phishing,
these skills is expensive and all stakeholders see the need social engineering attacks, tailgating, etc.?
to collaborate to ensure adequate training that meets the - 70% of the enterprises don’t have scheduled
needs of all. On the other hand, better skilled graduates awareness briefing for their operators on security
from all the partner countries will not only improve the themes.
Industrial fabric, security and prosperity of each partner
country but also improve the employability of technical Q8. Can you estimate the cost of recovering the current
graduates in these countries, countries still challenged by status of your automation network in case of a major
excessively high youth unemployment rates. Improving disruption caused by a security breach?
the chances of employment by improving necessary skills - 67% of the enterprises cannot estimate the cost of
is of paramount importance. recovering their automation network from a major
In order InCyS4.0 to assure that the provided training disruption caused by a security breach.
material fits the needs of European Industries, it conducted Q9. Do you implement a firmware and configuration
a field research in every partner country. Field research had backup strategy for your automation devices?
the form of an anonymous questionnaire targeting the IT
personnel of local industries, so the project investigates the - 60% of the enterprises implement a firmware and
security weaknesses of the participating enterprises and configuration backup strategy for their
adapt its training content according to the feedback. From automation strategies. From these enterprises
each partner country, at least 10 representative large only 50% check their backups regularly.
enterprises or SMEs participated. Due to the criticality and Q10. Is your network segmented into separated
the significance of the given information, a confidentiality subnetworks for IT (office network: PC's and servers)
agreement was signed. The following section presents the and OT (automation network: PLC, HMI,
results from this statistical research. For each question the sensors/actuators)?
corresponding major statistical finding is highlighted.
- Only 30% of the participating enterprises have
Q1. Do you implement a security policy at your enterprise? their networks segmented into different
- 80% of the enterprises answered they implement subnetworks for IT and OT.
a security policy at their organization. Q11. Do you have configured a firewall to control the
Q2. What is your password policy? traffic between IT and OT networks?
- 55% of the enterprises answered that they don’t - The majority of the enterprises (83%) have
have a password policy. From the rest 45% that configured a firewall to control the traffic
implements a password policy, only ¼ of them between the two networks.
has very strict rules. Q12. Does your organization use manageable switches
Q3. Do you implement any monitoring and control in order to control and monitor network traffic?
measures of those who have access to each part of the - 60 % of the companies do not use manageable
automation production process? switches and
- Although most of the companies have monitoring Q13. Does your organization have deployed any traffic
and control measures of those who have physical analysis tool to detect abnormal traffic or unauthorized
access to each part of the automation production connections?
process, only 42% of them keep detailed log files.
- 75% of the organizations do not have deployed
Q4. Is your network equipment physically secured in a any such traffic analysis tool.
restricted access room?
Q14. Does your organization have any anti-
- Only 60% of the companies have their network virus solution deployed in order to detect infected
equipment physically secured in a restricted hosts?
access room.
- Only 50% of the organizations have deployed
Q5. Do you implement any update/upgrade policy for the anti-virus solutions for the detection of infected
firmware used in your automation mechanisms? hosts.
- 65% of the enterprises answered that they don’t Q15. Is it possible to remotely access (remote Desktop,
have an update/upgrade policy. remote sessions) your organizational OT network?
Q6. Are your workers allowed to connect their own - 70% of the enterprises allow remote access to
devices to the enterprise network? their organizational OT network.
Q16. Is remote access controlled by a firewall?
- 65% of the enterprises which allow remote InCyS4.0 will provide a training course (EQF level 5+)
access, have it controlled by a firewall. in cyber security awareness and responsiveness for current
and future technicians/engineers who will work
Q17. Do you have any contingency plan in case of a with/alongside Industrial 4.0 Control Systems. The flexible
cyber-attack? didactic modules created for InCyS 4.0 consist of a total of
- 50% of the enterprises do not have a contingency 30-50 hours of training that:
plan.
− Provide an overview of the most important concepts
Q18. Does your organization use secure connections associated with the area of Industrial security.
towards your network equipment (VPN, SSH − Help trainees to understand the main differences
tunnels)? between security policies that are carried out in IT and
- The majority of the companies (70%) allow OT environments.
secure remote connections to their systems, but − Analyze the main vulnerabilities and threats that can be
there is a critical 30% that do not. suffered in industrial environments.
− Know the different types of attacks that can be made to
Q19. Does your organization allow WLAN
an OT network or a critical infrastructure.
connections on the OT network?
− Introduce the most important aspects associated with
- 70% of the organizations allow WLAN the protection of critical infrastructures and current
connections on their OT network. regulations.
Q20. Does the OT WLAN connection use WPA2? − Describe the main countermeasures that can be
included to strengthen industrial networks and
- All of the enterprises that allow WLAN protocols.
connections on their OT networks have them
secured with WPA2 protocol. The educational content that will be developed by the
project for training of the technical personnel in industries
Q21. Does your OT WLAN setup authenticate the comprises the following three modules:
clients (RADIUS server or certificates)?
− Industrial Systems
- Only 43% of the OT WLAN setups authenticates
the clients. − Security Concepts in Industrial Environments
Q22. Does your OT WLAN setup filter clients using − Confidentiality, Integrity, Availability in
MAC addresses? Industrial Environments
The following sections elaborate further on the content
- 65% of the OT WLAN setups do not filter clients
of these modules.
using MAC addresses.
Module 1: Industrial Systems: Components And
Characteristics - Integration of IT/OT
III. EDUCATIONAL MATTERIAL OF INCYS4.0 This module is an introduction to the architecture of the
The findings of the aforementioned research illustrate a ICS systems presenting the main components of them
fuzzy and blurred landscape in the European SMEs as it including:
concerns their readiness for cyberspace attacks. Despite the
− The control loop consisting of various sensors and
growing number of recent cyberphysical attacks, it seems
that IT operators do not consider this likelihood seriously. actuators and a controller that manages the actuators
Probably this ignorance comes from the past when most based on sensor readings and operator input.
industrial automation systems were monolithic and − The human-machine interface (HMI) and SCADA
vendor-specific solutions with little or any interaction with supervisory systems that allow operators to monitor
the TCP/IP world. Indeed, in such information systems the the controlled process and influence it.
main risk was from physical intruders into the premises, − The data repository and data analytics tool that logs
justifying thus the existence of guards and fencing around all process control activity to allow reporting at
the plants. But with industry 4.0 and the transformation of multiple levels.
existing industries into smart ones it induces via Internet of − The Remote diagnostics and maintenance tool that
Things solutions, cloud data centers, virtualization of allows ICS support staff and vendors access to
services, Artificial Intelligence and data analytics, the diagnose and correct operational problems.
weaknesses and pathogenesis of TCP/IP are injected into − The interconnecting network comprising several
Industrial Control Systems. In such an ecosystem, an
different technologies from traditional serial
intrusion by cyber-attackers into the virtual cyberspace of
protocols (e.g., RS232/485) and fieldbus topologies
an enterprise is a far more obvious issue than any physical
attack against the physical establishments of a plant. The (e.g., Modbus, Profibus, CAN) to packet data
results of the research highlight and verify the suspicions protocols (e.g., Profinet, Industrial Ethernet), TCP/IP
for critical vulnerabilities and weaknesses of existing integration (e.g., VLANs, VPN, remote access, QoS)
industries into cybersecurity issues, especially as it and wireless connectivity (e.g., WLAN, 802.15.4,
concerns awareness of associated personnel for them. LPWAN).
Module 2: Security Concepts In Industrial Environments. b) Highlights the most common security threads and
This module: challenges that any such highly distributed ecosystem
should be aware of and ready to handle. In this context,
a) Presents the modern virtual ecosystem of smart plants various cyber-attack scenarios on industrial systems
as it is structured today in the context of Industry 4.0. are analysed and demonstrated including:
In this context, several state-of-the-art technological
• Denial-of-Service (DoS) Attack
innovations that transform the lifecycle of a typical
ICS into a distributed one are introduced. The latter • Man-in-the-Middle (MitM) Attacks
includes: • Modbus/TCP Protocol Attack
• Dictionary Attack
i) Cloud and Edge Computing. The former is the
trend that first introduced the sense of
virtualization for computing and storage resources Module 3: Confidentiality, Integrity, Availability in
creating the different types of the “-as-a-Service” Industrial Environments
paradigm (Infrastructure-aaS, Software-aaS, This module focuses on issues of Information Security in
Platform-aaS) [10][11][12]. Cloud computing industrial environments emphasizing on the protection of
created the need for resources orchestration so Confidentiality, Integrity and Availability (known as the
distributed resources are integrated and centraly CIA triad) of industrial data. In this context, various
managed. Also, the introduction of IoT into industry standards and recommendations on how data is
industrial environments brought the need for data accessed, processed, stored, transferred and destroyed will
processing closer to the field devices to improve be examined including password, antivirus, firewall,
response times and save bandwidth. This opened encryption, etc. policies. Furthermore, many different
the path to Edge computing. With Edge forms of modern threads will be analyzed such as software
computing some part of processing happens closer attacks, theft of intellectual property, identity theft, theft
to the location where it is needed and the of equipment or information, etc., with viruses, worms,
remaining to the cloud [13]. phishing attacks and Trojan horses to constitute common
ii) Network Function Virtualization (NFV) and examples of the former.
Software Defined Networking (SDN). Cloud
InCyS4.0 will also produce a Practical Cyber Security
computing paved the way for less typical forms of
Guide for technicians covering the fundamentals of cyber
virtualization, such as the NFV paradigm. With
security for Industrial Systems. This will take the form of
NFV, IT virtualization is used to virtualize entire a Quick Guide, summarizing the main risks and steps to
classes of network node functions into building follow for technicians working around digital control
blocks that may connect, or chain together, to systems in Industry 4.0. It can be distributed as a stand-
create communication services [14]. A virtualized alone handbook on the most basic issues and as a
network function, may consist of one or more complement to the main training material.
virtual machines running software and processes,
on top of standard servers, switches and storage As formal training in cyber security, specifically aimed at
devices, or even on top of some cloud reducing the risks involved in connected Industrial
infrastructure [14]. Examples of NFV include Control Systems (ICS), is not yet available in formal
virtualized load balancers, firewalls, and intrusion Educational programmes, the training provided by InCyS
detection devices. NFV is ideally complemented 4.0 is highly innovative. In the context of the project,
by SDN. The latter attempts to centralize network modular content will be created using eXelearning
intelligence by disassociating data plane of software [16]. eXeLearning is a free software tool under
computer networks from control plane and GPL-2 that can be used for creating interactive educational
assigning control plane to SDN controllers that are web content. All the educational materials generated with
considered to be the brain of SDN networks [13]. eXeLearning are exported in different digital formats, so
they can be used independently or integrated into a LMS
iii) Industrial Internet of Things (IIoT). This refers to
(Learning Management System) like Moodle. As such, the
the evolution of typical Industrial Control
InCyS 4.0 Course content will be highly transferable in
Systems so interconnected sensors, actuators,
terms of access for integration into existing industrial
instruments, controllers and other devices are
educational programmes or other training options. The
networked together with industrial applications
produced open source content, along with relevant
[15]. This connectivity allows for a higher degree
activities in the three modules and the quick guide, will be
of automation via data collection, exchange, and
sporadically available online on the project’s website
analysis. IIoT is an umbrella term that
http://www.incybersecurity.eu/ .
incorporates advances from various technological
fields such as wireless and computer networking,
cyber-physical systems, cloud and edge IV. CONCLUSIONS
computing, big data analytics, artificial
intelligence and machine learning, cybersecurity. In the modern automated industrial landscape of Industry
4.0, the monolithic and vendor-specific industrial systems
of the past with little or any interaction with the TCP/IP
world, are transformed to digitally connected control Landscape in Industrial Control Systems,” Proc. IEEE,
ecosystems. In such highly distributed environments vol. 104, no. 5, pp. 1039–1057, May 2016.
specialized software enables centralized management and [8] Deloitte, “Industry 4.0 and cybersecurity
orchestration of available services and infrastructures Managing risk in an age of connected production A
controlling the manufacturing process. The latter ideally Deloitte series on digital manufacturing,” 2017.
provides a unified operating framework for vendor- [9] “Research Innovation Strategies for Smart
agnostic, policy-driven service design, implementation, Specialisation - Regional Policy - European
analytics and lifecycle management for large-scale Commission.” [Online]. Available:
workloads and services. However, the emergence of this https://ec.europa.eu/regional_policy/en/information/publi
evolution comes with a price: new risks and security cations/brochures/2014/research-innovation-strategies-
threads abound for which industrial employers should for-smart-specialisation. [Accessed: 29-Jul-2019].
become aware of. The InCyS 4.0 research program aims [10] Y. Nikoloudakis; S. Panagiotakis; E. Markakis;
to fill the technological gap that exists between existing G. Mastorakis; C. X. Mavromoustakis; E. Pallis,
operational technology personnel and state-of-the art “Towards a FOG-enabled navigation system with
technological trends. This gap was highlighted from the advanced cross-layer management features and IoT
results of a statistical research that was conducted in many equipment”, chapter contribution in the “Cloud and Fog
industries from the three participating countries. The Computing in 5G Mobile Networks: Emerging advances
analysis of the collected questionnaires identified the and applications”, Editors: Evangelos Markakis ; George
needs of industrial personnel for technological awareness Mastorakis ; Constandinos X. Mavromoustakis ;
in cybersecurity issues. Afterwards, a detailed Evangelos Pallis, ΙΕΤ, March 2017, pp. 171 –191.
cybersecurity guide will be provided to industrial [11] Koralia Papadokostaki, George Mastorakis,
production technicians, in a way that every term or Spyros Panagiotakis, “Handling Big Data in the era of
definition is simple-, to help them identify cyber-security IoT”, chapter contribution in the “Advances in Mobile
vulnerabilities. InCyS 4.0 involves universities, a Cloud Computing and Big Data in the 5G Era”, Editors:
vocational training organization, a consultancy company Mavromoustakis Constandinos X., Mastorakis George,
and industrial enterprises in each participating country. Dobre Ciprian, Springer-Verlag (2017), pp. 3-22.
The project strengthens co-operation between education, [12] Georgios Skourletopoulos, Constandinos X.
research and industry by offering more attractive and Mavromoustakis, George Mastorakis, Jordi Mongay
effective education in the form of high-quality learning Batalla, Ciprian Dobre, Spyros Panagiotakis, Evangelos
opportunities that improve technical skills and meet the Pallis, “Big Data and Cloud Computing: A Survey of the
needs of employers in an evolving labor market. State-of-the-Art and Research Challenges”, chapter
contribution in the “Advances in Mobile Cloud
Computing and Big Data in the 5G Era”, Editors:
REFERENCES Mavromoustakis Constandinos X., Mastorakis George,
[1] “Industrial Cyber Security 4.0”, ofiicial web Dobre Ciprian, Springer-Verlag (2017), pp. 23-41.
page, http://incybersecurity.eu/ , [Accessed: 29-Jul-2019] [13] Yannis Nikoloudakis; Spyridon Panagiotakis;
[2] L. Thames and D. Schaefer, "Cybersecurity for Evangelos Markakis; Evangelos Pallis; George
industry 4.0 : analysis for design and manufacturing, Mastorakis; Constantinos X. Mavromoustakis; Ciprian
Springer International Publishing, 2017, DOI Dobre, “A Fog-Based Emergency System for Smart
10.1007/978-3-319-50660-9. Enhanced Living Environments”, IEEE Cloud
[3] “Industrial Security - Cyberthreats to ICS Computing, Year: 2016, Volume: 3, Issue: 6, Pages: 54 -
Systems”, Carpesky Labs 2014, available from 62, DOI: 10.1109/MCC.2016.118.
https://media.kaspersky.com/en/business- [14] Network function virtualization,
security/critical-infrastructure- https://en.wikipedia.org/wiki/Network_function_virtualiz
protection/Cyber_A4_Leaflet_eng_web.pdf [Accessed: ation, [Accessed: 29-Jul-2019]
29-Jul-2019]. [15] Giorgos M. Papadourakis, Spyros Panagiotakis,
[4] S. Mohurle and M. Patil, “A brief study of John Fasoulas, Konstantinos Karampidis, Maria
Wannacry Threat: Ransomware Attack 2017,” Int. J. Adv. Christofaki, Anabel Menica, Xabier Ugarte, Silvano
Res. Comput. Sci., vol. 8, no. 5. Bertaina, Nuno Escudeiro, “Open Source Applications for
[5] S. Y. A. Fayi, “What Petya/NotPetya Industrial Automation (OpenIn) using Arduino”, 17th
Ransomware Is and What Its Remidiations Are,” Springer, International Symposium on Ambient Intelligence and
Cham, 2018, pp. 93–100. Embedded Systems (AMIES 2018), Kiel, Germany, 12 -
[6] A. Ioanid, C. Scarlat, and G. Militaru, “The 15 September 2018.
Effect of Cybercrime on Romanian SMEs in the Context [16] eXeLearning.net, “eXeLearning.net.” [Online].
of Wannacry Ransomware Attacks”, in proc. of 12th Available: http://exelearning.net/en/. [Accessed: 22-Jun-
European Conference on Innovation and 2019].
Entrepreneurship, 2017, pp. 307–313.
[7] S. McLaughlin et al., “The Cybersecurity

You might also like