Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = Factory of the Future (FoF), cyber threat actor

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1398 KiB  
Article
Cyber Threat Actors for the Factory of the Future
by Mirko Sailio, Outi-Marja Latvala and Alexander Szanto
Appl. Sci. 2020, 10(12), 4334; https://doi.org/10.3390/app10124334 - 24 Jun 2020
Cited by 24 | Viewed by 14581
Abstract
The increasing degree of connectivity in factory of the future (FoF) environments, with systems that were never designed for a networked environment in terms of their technical security nature, is accompanied by a number of security risks that must be considered. This leads [...] Read more.
The increasing degree of connectivity in factory of the future (FoF) environments, with systems that were never designed for a networked environment in terms of their technical security nature, is accompanied by a number of security risks that must be considered. This leads to the necessity of relying on risk assessment-based approaches to reach a sufficiently mature cyber security management level. However, the lack of common definitions of cyber threat actors (CTA) poses challenges in untested environments such as the FoF. This paper analyses policy papers and reports from expert organizations to identify common definitions of CTAs. A significant consensus exists only on two common CTAs, while other CTAs are often either ignored or overestimated in their importance. The identified motivations of CTAs are contrasted with the specific characteristics of FoF environments to determine the most likely CTAs targeting FoF environments. Special emphasis is given to corporate competitors, as FoF environments probably provide better opportunities than ever for industrial espionage if they are not sufficiently secured. In this context, the study aims to draw attention to the research gaps in this area. Full article
(This article belongs to the Special Issue Cyber Factories – Intelligent and Secure Factories of the Future)
Show Figures

Figure 1

Back to TopTop