Skip to main content

Overview of Cyber Security in the Industry 4.0 Era

  • Chapter
  • First Online:
Book cover Industry 4.0: Managing The Digital Transformation

Part of the book series: Springer Series in Advanced Manufacturing ((SSAM))

Abstract

The global development industry is in the midst of a transformation to meet today’s more complex and highly competitive industry demands. With the rapid advances in technology, a new phenomenon has emerged in the current era, Industry 4.0. The integration of information technology and operational technology brings newer challenges, especially cyber security. In this chapter, one of the most popular topics of recent times, cyber security issue, has been investigated. The occurrence of the Internet of Things (IoT), has also dramatically altered the appearance of cyber threat. Security threats and vulnerabilities of IoT, industrial challenges , main reasons of cyber-attacks, cyber security requirement and some cyber security measures/methods are discussed with a global perspective involving both the public and private sector in the IoT context.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abomhara M, Kien GM (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur 4:65–88

    Article  Google Scholar 

  • Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36:93–101. doi:10.1007/s10916-010-9449-4

    Article  Google Scholar 

  • Ali I, Sabir S, Ullah Z (2016) Internet of things security, device authentication and access control: a review. Int J Comput Sci Inf Secur 14:456

    Google Scholar 

  • Appari A, Johnson ME (2010) Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag 6:279. doi:10.1504/IJIEM.2010.035624

    Article  Google Scholar 

  • BI Intelligence (2010) 10 data-security measures. Bus. Insid. Digit

    Google Scholar 

  • BI Intelligence (2015) The enterprise internet of things market—business insider. http://www.businessinsider.com/the-enterprise-internet-of-things-market-2015-7. Accessed 19 Jun 2017

  • Capgemini (2015) Securing the internet of things opportunity: putting cybersecurity at the heart of the IoT | Capgemini Worldwide

    Google Scholar 

  • Chemringts (2014) The evolution of cyber threat and defence. UK

    Google Scholar 

  • Columbus L (2016) Roundup of internet of things forecasts and market estimates In: Forbes. https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#7eba4b9a292d. Accessed 20 Jun 2017

  • Craig D (2016) Five cybersecurity challenges facing financial services organizations today. IBM Secur Intell

    Google Scholar 

  • Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10:2233–2243. doi:10.1109/TII.2014.2300753

  • Deloitte (2013) Risk angles—five questions on the evolution of cyber security. United Kingdom

    Google Scholar 

  • Frost and Sullivan (2017) Cyber Security in the Era of Industrial IoT. Frost & Sullivan White Paper, Germany

    Google Scholar 

  • Kaplan J, Weinberg A, Sharma S (2011) Meeting the cybersecurity challenge. Digit. McKinsey

    Google Scholar 

  • Kizza JM (2009) Guide to computer network security. Springer, Berlin

    Google Scholar 

  • Korolov M (2015) Healthcare organizations face unique security challenges | CSO Online. CSO

    Google Scholar 

  • Kumar SA, Vealey T, Srivastava H (2016) Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii international conference on system sciences (HICSS). IEEE, pp 5772–5781

    Google Scholar 

  • Li S (2017) Security requirements in IoT architecture. In: Securing the internet of things, pp 97–108

    Google Scholar 

  • McMillen D (2016) Attacks targeting industrial control systems (ICS) up 110 percent. IBM

    Google Scholar 

  • NATO Review (2013) The history of cyber attacks—a timeline. http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm. Accessed 20 Jun 2017

  • Nibusiness (2017) Common cyber security measures. In: nibusinessinfo.co.uk. https://www.nibusinessinfo.co.uk/content/common-cyber-security-measures. Accessed 20 Jun 2017

  • RISI (2015) RISI—the repository of industrial security incidents. http://www.risidata.com/Database/Detail/maroochy-shire-sewage-spill. Accessed 20 Jun 2017

  • Rodosek GD, Golling M (2013) Cyber security: challenges and application areas. Springer, Berlin, pp 179–197

    Google Scholar 

  • Rüßmann M, Lorenz M, Gerbert P et al (2015) Industry 4.0: the future of productivity and growth in manufacturing industries

    Google Scholar 

  • Sathish Kumar J, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90:20–26. doi:10.5120/15764-4454

  • Schneier B (2011) Secrets and lies : digital security in a networked world. Wiley, Hoboken

    Google Scholar 

  • Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng 2017:1–25. doi:10.1155/2017/9324035

    Article  Google Scholar 

  • Sheikh S (2014) Evolving cyber security—a wake up call… In: Marsh National Oil Conference. Dubai

    Google Scholar 

  • Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 international conference on computer science and electronics engineering. IEEE, pp 648–651

    Google Scholar 

  • Taneja M (2013) An analytics framework to detect compromised IoT devices using mobility behavior. In: 2013 international conference on ICT convergence (ICTC). IEEE, pp 38–43

    Google Scholar 

  • Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 1–17. doi:10.1007/s11277-017-4434-6

  • Warren M, Hutchinson W (2000) Cyber attacks against supply chain management systems: a short note. Int J Phys Distrib Logist Manag 30:710–716. doi:10.1108/09600030010346521

    Article  Google Scholar 

  • WaterISAC (2015) 10 Basic cybersecurity measures—best practices to reduce exploitable weaknesses and attacks

    Google Scholar 

  • Weber RH, Studer E (2016) Cybersecurity in the internet of things: legal aspects. Comput Law Secur Rev 32:715–728. doi:10.1016/j.clsr.2016.07.002

    Article  Google Scholar 

  • Wendt H, Renn J (2012) Knowledge and science in current discussions of globalization. In: The globalization of knowledge in history. Edition Open Access

    Google Scholar 

  • Yang D-L, Liu F, Liang Y-D (2010) A survey of the internet of things. In: Proceedings of the 1st International Conference on E-Business Intelligence (ICEBI2010). Atlantis Press

    Google Scholar 

  • Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd international conference on cloud computing. IEEE, pp 268–275

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Beyzanur Cayir Ervural .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ervural, B.C., Ervural, B. (2018). Overview of Cyber Security in the Industry 4.0 Era. In: Industry 4.0: Managing The Digital Transformation. Springer Series in Advanced Manufacturing. Springer, Cham. https://doi.org/10.1007/978-3-319-57870-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57870-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57869-9

  • Online ISBN: 978-3-319-57870-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics