z-logo
Premium
Digital Enterprise and Cyber Security Evolution
Author(s) -
Raicu Alexandra,
Raicu Gabriel
Publication year - 2021
Publication title -
macromolecular symposia
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.257
H-Index - 76
eISSN - 1521-3900
pISSN - 1022-1360
DOI - 10.1002/masy.202000326
Subject(s) - computer security , computer science , process (computing) , process management , engineering management , business , engineering , operating system
Abstract Industry 4.0 requires increased connectivity and the use of standard communication protocols which nowadays imply an increased need to protect critical industrial systems and manufacturing lines from cyber threats. One cannot talk about the evolution of the digital enterprise without cyber security. There are a lot of cyber security incidents related to Industry 4.0 and Internet of Things developments. PLM, as a whole concept, is prone to cyber threats due to complex interactions between management of design data, quality management, process management, portfolio management, supply chain management, customer relationship management, and management of whole things which are related to the product. The paper addresses the evolutionary cyber threats in last decade using public resources. At present, the large companies that supply industrial equipment have also taken into account the aspects of cyber security. The paper, also presents certain approaches from a scientific point of view in Constanta Maritime University (CMU) research center for the cyber security. To address this complex research field, CMU started several years ago, a complex research and innovative project related to advanced research, training, and development of new technologies in maritime cyber security. Using the CMU complex cyber security simulator, it is able to generate some massive scenarios in technical related fields such as maritime operations, technical design, and technical simulations and detect potential vulnerabilities. One of these kinds of activities is treated as potential long term risks due to the nature of induced vulnerabilities in PLM software.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here