2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) 2020
DOI: 10.1109/etfa46521.2020.9212126
|View full text |Cite
|
Sign up to set email alerts
|

Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…With this, we can create a dataset that will help us evaluate the situation and value the system. • The second aspect is an Industrial IoT architecture that transforms and articulates this information in an agile way from the operational technology (OT) [42] environment to information technology (IT) [43]. From this point, we will obtain a classified and plotted structure of the acquired data in near real time to make decisions in the face of the problem.…”
Section: Proposalmentioning
confidence: 99%
“…With this, we can create a dataset that will help us evaluate the situation and value the system. • The second aspect is an Industrial IoT architecture that transforms and articulates this information in an agile way from the operational technology (OT) [42] environment to information technology (IT) [43]. From this point, we will obtain a classified and plotted structure of the acquired data in near real time to make decisions in the face of the problem.…”
Section: Proposalmentioning
confidence: 99%
“…In Section 2, the paper will discuss the overall risk management with the vulnerabilities and threats identification, followed by the existing security assessment. Section 3 will describe known risk sources in Operational Technology (OT) [59,60] systems with several examples of these systems' vulnerabilities exploitation. Section 4 will discuss where the most urgent actions are required in industrial control network systems, presenting several examples of solutions improving the security.…”
Section: Introductionmentioning
confidence: 99%
“…In the knowledge that cybersecurity is an existential problem that is often not given proper consideration by SMEs, an increasing number of customers demand audit certificates from their suppliers as proof of a basic level of security [12]. Comparing international information security (IS) standards for certification and frameworks in combination with a corresponding literature review, it is shown that effective operational IS management is a systematic means of addressing the threats and risks to information system security, where technology is not enough [13].…”
mentioning
confidence: 99%
“…However, there is a lack of SME-focused ISMS. As a result, Wagner et al strongly recommend explicitly considering the specific role of SMEs and creating dedicated and auditable standards [12]. Their study shows that most domain-specific security standards are applicable to large enterprises.…”
mentioning
confidence: 99%
See 1 more Smart Citation