Abstract
The global development industry is in the midst of a transformation to meet today’s more complex and highly competitive industry demands. With the rapid advances in technology, a new phenomenon has emerged in the current era, Industry 4.0. The integration of information technology and operational technology brings newer challenges, especially cyber security. In this chapter, one of the most popular topics of recent times, cyber security issue, has been investigated. The occurrence of the Internet of Things (IoT), has also dramatically altered the appearance of cyber threat. Security threats and vulnerabilities of IoT, industrial challenges , main reasons of cyber-attacks, cyber security requirement and some cyber security measures/methods are discussed with a global perspective involving both the public and private sector in the IoT context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abomhara M, Kien GM (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur 4:65–88
Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36:93–101. doi:10.1007/s10916-010-9449-4
Ali I, Sabir S, Ullah Z (2016) Internet of things security, device authentication and access control: a review. Int J Comput Sci Inf Secur 14:456
Appari A, Johnson ME (2010) Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag 6:279. doi:10.1504/IJIEM.2010.035624
BI Intelligence (2010) 10 data-security measures. Bus. Insid. Digit
BI Intelligence (2015) The enterprise internet of things market—business insider. http://www.businessinsider.com/the-enterprise-internet-of-things-market-2015-7. Accessed 19 Jun 2017
Capgemini (2015) Securing the internet of things opportunity: putting cybersecurity at the heart of the IoT | Capgemini Worldwide
Chemringts (2014) The evolution of cyber threat and defence. UK
Columbus L (2016) Roundup of internet of things forecasts and market estimates In: Forbes. https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#7eba4b9a292d. Accessed 20 Jun 2017
Craig D (2016) Five cybersecurity challenges facing financial services organizations today. IBM Secur Intell
Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10:2233–2243. doi:10.1109/TII.2014.2300753
Deloitte (2013) Risk angles—five questions on the evolution of cyber security. United Kingdom
Frost and Sullivan (2017) Cyber Security in the Era of Industrial IoT. Frost & Sullivan White Paper, Germany
Kaplan J, Weinberg A, Sharma S (2011) Meeting the cybersecurity challenge. Digit. McKinsey
Kizza JM (2009) Guide to computer network security. Springer, Berlin
Korolov M (2015) Healthcare organizations face unique security challenges | CSO Online. CSO
Kumar SA, Vealey T, Srivastava H (2016) Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii international conference on system sciences (HICSS). IEEE, pp 5772–5781
Li S (2017) Security requirements in IoT architecture. In: Securing the internet of things, pp 97–108
McMillen D (2016) Attacks targeting industrial control systems (ICS) up 110 percent. IBM
NATO Review (2013) The history of cyber attacks—a timeline. http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm. Accessed 20 Jun 2017
Nibusiness (2017) Common cyber security measures. In: nibusinessinfo.co.uk. https://www.nibusinessinfo.co.uk/content/common-cyber-security-measures. Accessed 20 Jun 2017
RISI (2015) RISI—the repository of industrial security incidents. http://www.risidata.com/Database/Detail/maroochy-shire-sewage-spill. Accessed 20 Jun 2017
Rodosek GD, Golling M (2013) Cyber security: challenges and application areas. Springer, Berlin, pp 179–197
Rüßmann M, Lorenz M, Gerbert P et al (2015) Industry 4.0: the future of productivity and growth in manufacturing industries
Sathish Kumar J, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90:20–26. doi:10.5120/15764-4454
Schneier B (2011) Secrets and lies : digital security in a networked world. Wiley, Hoboken
Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng 2017:1–25. doi:10.1155/2017/9324035
Sheikh S (2014) Evolving cyber security—a wake up call… In: Marsh National Oil Conference. Dubai
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 international conference on computer science and electronics engineering. IEEE, pp 648–651
Taneja M (2013) An analytics framework to detect compromised IoT devices using mobility behavior. In: 2013 international conference on ICT convergence (ICTC). IEEE, pp 38–43
Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 1–17. doi:10.1007/s11277-017-4434-6
Warren M, Hutchinson W (2000) Cyber attacks against supply chain management systems: a short note. Int J Phys Distrib Logist Manag 30:710–716. doi:10.1108/09600030010346521
WaterISAC (2015) 10 Basic cybersecurity measures—best practices to reduce exploitable weaknesses and attacks
Weber RH, Studer E (2016) Cybersecurity in the internet of things: legal aspects. Comput Law Secur Rev 32:715–728. doi:10.1016/j.clsr.2016.07.002
Wendt H, Renn J (2012) Knowledge and science in current discussions of globalization. In: The globalization of knowledge in history. Edition Open Access
Yang D-L, Liu F, Liang Y-D (2010) A survey of the internet of things. In: Proceedings of the 1st International Conference on E-Business Intelligence (ICEBI2010). Atlantis Press
Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd international conference on cloud computing. IEEE, pp 268–275
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ervural, B.C., Ervural, B. (2018). Overview of Cyber Security in the Industry 4.0 Era. In: Industry 4.0: Managing The Digital Transformation. Springer Series in Advanced Manufacturing. Springer, Cham. https://doi.org/10.1007/978-3-319-57870-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-57870-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57869-9
Online ISBN: 978-3-319-57870-5
eBook Packages: EngineeringEngineering (R0)