Auflistung nach Schlagwort "critical infrastructure"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragCyberattacks in agribusiness(42. GIL-Jahrestagung, Künstliche Intelligenz in der Agrar- und Ernährungswirtschaft, 2022) Hoffmann, Christa; Haas, Roland; Bhimrajka, Nidhish; Penjarla, Naga SrihithCyberattacks are increasing across different industry sectors. The agribusiness sector has seen an accelerating rate of ransomware attacks both upstream as well as downstream. The article analyses attacks which were reported over more than a decade and summarizes the major trends. The increasing connectivity and deployment of sophisticated IT solutions for precision and smart farming makes this sector potentially very vulnerable.
- TextdokumentForensic-related Application Security Controls for RHEL in Critical Infrastructure(INFORMATIK 2017, 2017) Bajramovic, Edita; Lainer, AndreasIndustrial cyber security is an avid area of research. Incident response and forensic investigations are complex activities. Due to the complexity of critical infrastructures, such as Nuclear Power Plants (NPPs), preparation is vital. Manual approaches still tend to be favored mainly because of (physical) safety assurances. The tasks and actions required and the outcomes to expect need to be documented. Application Security Controls (ASCs) are a good way to document forensic controls for which an extended model is proposed. However, ASCs must be tested further on forensic applicability and there are also considerable alternatives. In terms of possible additional security measures and to apply the gained insights, one exemplary operational Instrumentation & Control (I&C) server system is analyzed in order to derive recommendations.
- TextdokumentMAC-layer Security for Time-Sensitive Switched Ethernet Networks(INFORMATIK 2020, 2021) Watson, Venesa; Ruland, Christoph; Waedt, KarlSecurity remains a key discussion point for industrial networks within critical infrastructure and Industry 4.0 (I4.0)/Smart Manufacturing infrastructures. While availability remains the chief security requirement for highest safety, integrity protection has become somewhat equal to availability in industry. Common integrity protection mechanisms, however, are not practical for the time-sensitive networks (TSNs) characteristic of I4.0 and critical infrastructures, where the time-critical and mission-critical transmissions cannot be negatively affected by the security overhead. To sufficiently protect and support TSNs, it is necessary to design an integrity protection scheme that provides lightweight security particularly at the OSI MAC-layer where the TSN protocols are defined. The development and testing of lightweight cryptographic algorithms provide one mean by which to achieve such an integrity protection, however, additional steps are needed to design and prove a suitable scheme. TSN-MIC is proposed as a viable scheme for MAC-layer security for TSNs in critical infrastructure and I4.0/Smart Manufacturing.