Logo des Repositoriums
 

Interactive graphical modeling of security artefacts for abstracted Industry 4.0 automation systems

dc.contributor.authorTchuegoue Djeukoua,Louis Roger
dc.contributor.authorKreho,Edin
dc.contributor.authorBelaidi,Siwar
dc.contributor.authorWaedt,Karl
dc.contributor.editorDemmler, Daniel
dc.contributor.editorKrupka, Daniel
dc.contributor.editorFederrath, Hannes
dc.date.accessioned2022-09-28T17:10:07Z
dc.date.available2022-09-28T17:10:07Z
dc.date.issued2022
dc.description.abstractThe frontend and backend are found in all software and therefore also on all websites. These two terms describe two different layers that make up programs or pages. About two thirds of all companies have their own website, and most employees use computers.Globally, cyberattacks are becoming more prominent and spreading to multiple areas, and the move to Industry 4.0 requires increased security measures. Important security precautions must be taken from the development of industrial devices that use the Industrial Internet of Things, with IEC 62443, ISO/IEC 27001, and their integration into the architecture of existing information and automation systems must be secure. IEC 62443 focuses on the IT security of so-called industrial automation and control systems (IACS), which are necessary for the safe and reliable operation of automated factories or infrastructures. ] Since security breaches are inevitable, it is also important to implement detection and response mechanisms in industrial automation and control systems (IACS). Together, these measures will enable various organizations to achieve an appropriate level of resilience. This paper discusses the interactive graphical representation of large-scale industrial automation systems for the purpose of modeling and evaluating cybersecurity during all phases of the industrial equipment life cycle. In addition, it addresses the expressiveness and scalability of front-end graphical problems by assuming that a multi-user back-end server with a semi-formal representation of cybersecurity-related artifacts is available, at least in software prototype form.en
dc.identifier.doi10.18420/inf2022_136
dc.identifier.isbn978-3-88579-720-3
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/39491
dc.language.isoen
dc.publisherGesellschaft für Informatik, Bonn
dc.relation.ispartofINFORMATIK 2022
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-326
dc.subjectIndustrial Automation and Control System
dc.subjectWeb Framework
dc.subjectGraphical User Interface
dc.subjectbi-directional data binding
dc.subjectcooperative real-time development
dc.subjectCybersecurity
dc.subjectAttack Scenarios
dc.subjectCyber Physical System
dc.titleInteractive graphical modeling of security artefacts for abstracted Industry 4.0 automation systemsen
gi.citation.endPage1582
gi.citation.startPage1571
gi.conference.date26.-30. September 2022
gi.conference.locationHamburg
gi.conference.sessiontitle7th GI/ACM I4.0 Workshop on Industrial Automation and Control Systems

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
industrial_06.pdf
Größe:
347.18 KB
Format:
Adobe Portable Document Format