Professional Documents
Culture Documents
0
November 2021
Re-Cap
Category of
Attack Type Target Motive Impact Cyber
Incidence
• How To Define Industry 4.0: After the reviewed literature, nine pillars:
1. big data,
2. autonomous robots,
3. simulation,
4. additive manufacturing,
5. IoT,
6. cloud computing,
7. augmented reality,
8. horizontal and vertical integration and
9. cyber security of Industry 4.0 are
• defined as referring the findings of BCGover Industry 4.0 (Rüßmann et al, 2015).
9 Pillars of Industry 4.0
The Concept Example
Ser NO
• Data Management
• Big Data, Cloud, Cyber Security
Core Technology for Industry 4.0
CPS
Plus a plethora of other
-Automation
-Robotics
-AI and advanced Analytics
-AR
-Edge Computing IIOT
-Simulation
-3D Printing
and Path breaking Processes
-Digitalization and Digital transformation
-Integration
-Optimization in real time
Connectivity -Merger of Virtual and Real world
-Digital Twins
CPS
• Machines in Industry 4.0 factory are Cyber-Physical Systems,
physical systems integrated with ICT components. They are
autonomous systems that can make their own decisions based on
machine learning algorithms and real-time data capture, analytics
results, and recorded successful past behaviours. Typically,
programmable machines (CNC and NC) are used, with a large share of
mobile agents and robots able of self-organization and self-
optimization.
Cyber Security –Industry 4.0
Cyber Security – common concern
• Cyber Security is one important issue, which could have a destructive impact
on business environment due to the harmful intents of terror attacks;
• therefore, preventable solutions and defense systems are necessary against
the negative effects of terror incidents.
• There are some solutions that destroy cyber terror attacks by analyzing
previous terror attacks via radiation control before future attacks occur.
• Besides, it is significant to construct national defense systems and train
employees against cyber attacks. Although solutions against cyber war would
cost the companies, the expected total cost would not be high considering
the potential negative effects of cyber attacks (Cho and Woo, 2017).
Cybersecurity - its relevance in Industry 4.0
• According to Lezzi et al. (2018), cyber-attacks to manufacturing
systems may entail a number of negative business impacts. In
particular, these impacts involve
• (i) sabotage of the entire critical infrastructure or target machines and
components,
• (ii) denial of service of networks and computers,
• (iii) theft of industrial trade secrets and intellectual property,
• (iv) violation of regulations in the fields of safety and pollution,
• (v) until the occurrence of life-threatening situations for workers.
Cyber security- traditional approach
• In the past, the manufacturing systems were closed and security was
ensured by their isolation and peripheral access control.
• Today, on the contrary, modern manufacturing machines are equipped
with a number of smart devices (e.g., sensors and actuators) and all are
interconnected via wireless networks or wired Ethernet to other
machines and data processing systems.
• Systems and components at the most communicate over private
industrial networks using specific protocols, but these do not provide
adequate protection against cyber-threats
SCADA scenario
Massively BYOD
Patching
Software & interconnected Third party
Unsupported
Apps components , access
OS
Interfaces systems and Proper
Endpoints
Cloud services devices authenticatio
Proprietary
Lateral n
Protocols
movements
The era of Industry 4.0
Spear Phishing
Application Layer Smart Applications
Ransomware,APT
Service
Spoofing, DOS
Service Layer management, DB,
malicious code,
API
Intelligent
Network Layer Sensors. WSN,WLAN Data Breach, Routing
Cloud network Attack, NW congestion
RFID,
Perception layer Unauthorised access
Sensors
What is zero trust security?
Severity
Strategic
Morphed
codes
Sophisticated
Malware
Directed attacks
Cyber Attacks
General type
BroadBand band
• Enter surreptuously
• Low and slow
• Plant malware
• Remote control
Persistance, Clean-
up and cover-up Modus Operandi of APT
Exfiltration,openi
ng Back door
C
O Mining Digital Gold
N
Lateral Movement
T
R Penetration via End-
points
O
L Reconnaissance
Targeting
Reactive Proactive
Adaptive
Cyber
Proactive Intelligence
Cyber
integrated
Reactive security
with cyber
Defence is set dictates the
defence
defence
Partial for some
against attack
CISO and IT foreseeable
manager attacks, not
responsible for totally on
InfoSec, set intelligence
for typical
Maturity curve
cyber attacks
Defs:
• Transducer: a device that converts one form of energy into another.
• Sensor: a device that converts a physical parameter to an electrical
output.
• Actuator: a device that converts an electrical signal to a physical
output.
Industry 4.0 –a paper:
• Henning Kagermann, Wolf Dieter Lukas and Wolfgang
Wahlster published the study, Industrie 4.0: Mit dem Internet der
Dinge auf dem Weg zur 4 Industriellen Revolution (Industry 4.0: with
the Internet of Things towards the 4th industrial revolution).
• According to Thomas Schulz, an expert on the subject, the authors
imagined that following previous revolutions –steam, electricity, job
specialisation, electronics- the industrial revolution taking place today
is based on Cyber-Physical Systems (CPS): internet, big data, analytics,
integration, etc.
Problem of Implementation
• Lack of in-house talent to support the development and deployment
of Industry 4.0 initiatives.
• Difficulties with integrating data from various sources to enable initial
connectivity.
• Lack of knowledge about technologies, vendors and IT outsourcing
partners that could help execute the core initiative.
Security for SCADA systems