Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Mitigating risks of digitalization through managed industrial security services
Jansen C., Jeschke S. AI & Society33 (2):163-173,2018.Type:Article
Date Reviewed: Oct 19 2018

This paper discusses the risks of industrial security services. Moreover, the authors consider future automation scenarios as well as the major concepts involved in industrial security services.

As a survey, the paper describes the major risks in Industry 4.0 and “shows how managed industrial security services can contribute to stabilize the industrial system.” The authors list cybersecurity threats, including “targeted attack to automation system, attack via Internet on decentralized control system, unauthorized access from office to production network.” These threats already exist and practically affect the stability of industrial services. In the countermeasure part, the authors mainly propose the automation and its protection, which has been rapidly developed in recent years. Finally, the authors discuss industrial security services from operation and management levels.

The paper provides a high-level roadmap for industrial security services. Its concepts and content are very practical. I recommend it to managers and engineers in this area.

Reviewer:  Zheng Gong Review #: CR146288 (1902-0065)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
General (I.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy