2019
DOI: 10.2478/cqpi-2019-0050
|View full text |Cite
|
Sign up to set email alerts
|

Selected Problems of Industry Databases and Information Infrastructure Security

Abstract: The paper presents selected security problems in ICT systems and OT used in industry. In the Industry 4.0 era, the knowledge and competence of the IT staff and the maintenance staff must be linked. Selected problems and their analysis and solutions form the semi-secure network and use of NoSQL databases as a database bridges are presented in the article for various branches of industry.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…For proper implementation, the μA(x) is named the membership degree of the element x to the fuzzy set A, but for universal implementation in technical system it is convenient to assume definition of μA as member functions (characteristic functions) without giving an exhaustive list of all the pairs that make the fuzzy set. Also, the fuzzy domain as a set of possible values for an attribute was named [3].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For proper implementation, the μA(x) is named the membership degree of the element x to the fuzzy set A, but for universal implementation in technical system it is convenient to assume definition of μA as member functions (characteristic functions) without giving an exhaustive list of all the pairs that make the fuzzy set. Also, the fuzzy domain as a set of possible values for an attribute was named [3].…”
Section: Methodsmentioning
confidence: 99%
“…(Fig. 1b) [3]. With the emergence of Industry 4.0, industrial controllers equipped with a PC class computer with standard operating systems such as MS Windows or Linux as shown in Fig.1c have also been created.…”
Section: Introductionmentioning
confidence: 99%
“…The ability of these systems to learn from historical compliance data-analyzing patterns of previous failures and successes-has enabled the recommendation of strategic adjustments that significantly refine organizational practices and adherence to statutory obligations [18,19]. LLM advancements facilitate a proactive, rather than reactive, approach to compliance, radically altering traditional methodologies that often struggle to keep pace with the adoption of new standards and practices in cybersecurity [20,21].…”
Section: Automated Compliance and Policy Generation Using Gen-mentioning
confidence: 99%