To see the other types of publications on this topic, follow the link: IEC-62443.

Journal articles on the topic 'IEC-62443'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IEC-62443.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Niemann, Karl-Heinz, and Pierre Kobes. "ISO 27000 oder IEC 62443?" atp magazin 66, no. 3 (2024): 60–67. http://dx.doi.org/10.17560/atp.v66i3.2706.

Full text
Abstract:
Betreiber von Produktionsanlagen stehen oft vor der Frage, welche Norm für die Absicherung der Anlage gegen Cyberangriffe heranzuziehen ist. Aus dem IT-Bereich ist die Normreihe ISO 27000 bekannt. Im Produktionsbereich wird häufig die Normreihe IEC 62443 herangezogen. Dieser Beitrag gibt einen Überblick über beide Normreihen und schlägt einen Ansatz zur gemeinsamen Nutzung beider Standards vor.
APA, Harvard, Vancouver, ISO, and other styles
2

Cindrić, Ivan, Marko Jurčević, and Tamara Hadjina. "Mapping of Industrial IoT to IEC 62443 Standards." Sensors 25, no. 3 (2025): 728. https://doi.org/10.3390/s25030728.

Full text
Abstract:
The increasing adoption of the Industrial Internet of Things (IIoT) has led to significant improvements in operational efficiency but has also brought new challenges for cybersecurity. To address these challenges, a number of standards have been introduced over the years. One of the best-known series of standards for this purpose is ISA/IEC 62443. This paper examines the applicability of the ISA/IEC 62443 series of standards, traditionally used for securing industrial automation and control systems, to the IIoT environment. For each requirement described in the ISA/IEC 62443 standards, relevan
APA, Harvard, Vancouver, ISO, and other styles
3

Heluany, Jessica B., and Ricardo Galvão. "IEC 62443 Standard for Hydro Power Plants." Energies 16, no. 3 (2023): 1452. http://dx.doi.org/10.3390/en16031452.

Full text
Abstract:
This study approaches cyber security in industrial environments focusing on hydro power plants, since they are part of the critical infrastructure and are the main source of renewable energy in some countries. The theoretical study case follows the standard IEC 62443-2-1 to implement a cyber security management system (CSMS) in a hydro power plant with two generation units. The CSMS is composed of six steps: (1) initiate CSMS, (2) high level risk assessment, (3) detailed risk assessment, (4) establish policies, procedures, and awareness, (5) select and implement countermeasures, and (6) mainta
APA, Harvard, Vancouver, ISO, and other styles
4

Петрашко, Вадим, та Олександр Улічев. "ДОСЛІДЖЕННЯ ІСНУЮЧИХ ПІДХОДІВ ДЛЯ СТВОРЕННЯ БЕЗПЕЧНОЇ МЕРЕЖІ". Молодий вчений, № 12 (124) (29 грудня 2023): 6–11. http://dx.doi.org/10.32839/2304-5809/2023-12-124-3.

Full text
Abstract:
У статті досліджено теоретичні питання формування кібербезпеки мережі за допомогою міжнародних стандартів ISO 27001 та ISA/IEC 62443, які спрямовані на забезпечення високого рівня кібербезпеки в організаціях та системах автоматизації. ISO 27001 фокусується на управлінні інформаційною безпекою, тоді як ISA/IEC 62443 спеціалізується на кібербезпеці для систем автоматизації та управління, зокрема в промисловості. Стандарт ISO 27001 визначає рамки для розробки та впровадження ефективної системи управління інформаційною безпекою. Основна увага приділяється управлінню ризиками, де організації визнач
APA, Harvard, Vancouver, ISO, and other styles
5

Tworek, Bartłomiej. "Cyber security requirements for railway control systems according to standard IEC 62443." WUT Journal of Transportation Engineering 131 (December 1, 2020): 79–86. http://dx.doi.org/10.5604/01.3001.0014.8197.

Full text
Abstract:
Modern railway control systems are based on computer and embedded systems. This components are connected directly via ICT networks, it is also possible to use wireless industrial networks. Cyber security attacks in automation control systems are becoming more dangerous and common. To protect these safety critical systems, the standard IEC 62443 has been developed. This standard provides guidelines and requirements for industrial automation and control systems which also apply to railway systems. This article is mainly focused on chapter IEC 62443-4-2 which provides Technical security requireme
APA, Harvard, Vancouver, ISO, and other styles
6

Waldeck, Boris. "Umfassende Unterstützung von Maschinenbetreibern in puncto Zugriffssicherheit." VDI-Z 161, no. 04 (2019): 36–38. http://dx.doi.org/10.37544/0042-1766-2019-04-36.

Full text
Abstract:
Damit Maschinen und Anlagen möglichst umfassend vor unberechtigten Zugriffen geschützt sind, müssen die dort verbauten Geräte gemäß Security-by-Design entwickelt worden sein. Was genau die zugrunde liegende Norm IEC 62443 hier fordert und wie die offene Steuerungsplattform „PLCnext“-Technology die Rahmenbedingungen umsetzt, wird im Folgenden erläutert.
APA, Harvard, Vancouver, ISO, and other styles
7

Ehrlich, Marco, Andre Bröring, Christian Diedrich, and Jürgen Jasperneite. "Towards automated risk assessments for modular manufacturing systems." at - Automatisierungstechnik 71, no. 6 (2023): 453–66. http://dx.doi.org/10.1515/auto-2022-0098.

Full text
Abstract:
Abstract Manufacturing systems based on Industry 4.0 concepts provide a greater availability of data and have modular characteristics enabling frequent changes. This raises the need for new security engineering concepts that cover the increasing complexity and frequency of mandatory security risk assessments. In contrast, the current standardization landscape used for the assessment of these systems only offers abstract, static, manual, and resource-intensive procedures. Therefore, this work proposes a method that further specifies the IEC 62443 aiming to automate the security risk assessments
APA, Harvard, Vancouver, ISO, and other styles
8

Brombach, Felix, and Artjom Schmidt. "Cybersecurity in Chemieanlagen." CITplus 27, no. 4 (2024): 18–19. http://dx.doi.org/10.1002/citp.202400405.

Full text
Abstract:
AbstractDie Vernetzung von teilweise alten Systemen birgt die Gefahr von Cyberbedrohungen, die die Sicherheit, Verfügbarkeit und Integrität von Anlagen gefährden. Zudem sind Fachkräfte für Cybersecurity von Betriebstechnik begrenzt verfügbar und auf dem Arbeitsmarkt heiß umkämpft. Eine Analyse zeigt, wie Betreiber mit den möglichen Gefahren für Chemieanlagen mit etablierte Sicherheitspraktiken wie beispielsweise KAS 51 und IEC 62443 umgehen können.
APA, Harvard, Vancouver, ISO, and other styles
9

Liderman, Krzysztof. "Ochrona informacji sterującej w sieciach i systemach przemysłowych – propozycja podstaw edukacyjnych." Przegląd Teleinformatyczny 8(26), no. 1-4 (2021): 3–30. http://dx.doi.org/10.5604/01.3001.0015.0604.

Full text
Abstract:
W artykule przedstawiono problematykę nauczania zagadnień bezpieczeństwa dla przemysłowych systemów sterowania. Po zwięzłym scharakteryzowaniu we wstępie sieci i systemów przemysłowych, w kolejnych punktach krótko opisano podstawowe dla tego obszaru problemowego normy i standardy (IEC 62443 oraz CIS Critical Security Controls for Effective Cyber Defense), framework MITRE ATT&CK oraz zbiór „dobrych praktyk” opublikowany przez Bundesamt für Sichercheit in der Informationstechnik.
APA, Harvard, Vancouver, ISO, and other styles
10

А.И., Грюнталь, та Базаева С.Е. "Вопросы обеспечения кибербезопасности при разработке и использовании АСУ ТП". Труды НИИСИ РАН 11, № 4 (2022): 56–67. http://dx.doi.org/10.25682/niisi.2021.4.0006.

Full text
Abstract:
Статья содержит обзор основных требований и методов, применяемых для обеспечения кибербезопасности технологических процессов, управляемых с помощью АСУ ТП. На примере ПЛК, функционирующего в составе аппаратно-программной платформы «Багет» разработки ФГУП ФНЦ НИИСИ РАН, приводится оценка степени соответствия требованиям, выдвигаемым стандартом ГОСТ Р МЭК 62443 к производителям и поставщикам компонентов АСУ ТП. The article contains an overview of the basic requirements and methods used to ensure the cybersecurity of technological processes controlled by an industrial control system. Using the ex
APA, Harvard, Vancouver, ISO, and other styles
11

Fritzsche, Denise, and Nora Crocoll. "OT‐Security beginnt mit der Anlagenplanung." CITplus 27, no. 3 (2024): 32–33. http://dx.doi.org/10.1002/citp.202400309.

Full text
Abstract:
AbstractFür Maschinenbauer und Anlagenbetreiber wird Security ein immer wichtigeres Thema. Normen wie die IEC 62443 stellen unter anderem Anforderungen an die Systemsicherheit und Sicherheitsstufen. Ziel ist es, mit der Maschinenverordnung die Cybersicherheit der Industrie zu stärken, gerade auch auf OT‐Ebene. Denn immer öfter wird diese von Angriffen auf die IT‐Ebene quasi als “Beifang” in Mitleidenschaft gezogen. Gleichzeitig sollte sie aber auch vor direkten Angriffen, die im Produktionsumfeld stattfinden, geschützt werden.
APA, Harvard, Vancouver, ISO, and other styles
12

Madsen, Marwin, Anna Palmin, Andreas Stutz, Mathias Maurmaier, and Mike Barth. "Security Analyse des MTP Konzepts." atp magazin 65, no. 8 (2023): 71–79. http://dx.doi.org/10.17560/atp.v65i8.2673.

Full text
Abstract:
Um den Anforderungen an die Flexibilität von Produktionsanlagen in der Prozessindustrie gerecht zu werden, ist die Modularisierung und insbesondere das in der VDI/VDE/NAMUR 2658 beschriebene Module Type Package Konzept ein weithin akzeptierter Ansatz. In diesem Bereich gibt es jedoch bisher nur wenige spezifische Sicherheitsbetrachtungen, weshalb dieser Beitrag Sicherheitsstandards und -richtlinien aufführt, denen das Module Type Package Konzept entsprechen sollte. Darauf aufbauend wird eine Sicherheitsanalyse des Module Type Package Konzepts anhand der IEC 62443, VDI/VDE 2182 und NIST SP 800-
APA, Harvard, Vancouver, ISO, and other styles
13

Pochmara, Janusz, and Aleksandra Świetlicka. "Cybersecurity of Industrial Systems—A 2023 Report." Electronics 13, no. 7 (2024): 1191. http://dx.doi.org/10.3390/electronics13071191.

Full text
Abstract:
The article explores the importance of cybersecurity in Industry 4.0, specifically focusing on safeguarding industrial automation systems from cyberattacks. It discusses essential security measures, network monitoring, and employee training, emphasizing the significance of risk management for ensuring industry stability. Adherence to industrial security standards, such as ISA/IEC 62443, is crucial (ISA—International Society of Automation, IEC—International Electrotechnical Commission). The article outlines cyberthreat challenges and their impact on various sectors, including healthcare and fin
APA, Harvard, Vancouver, ISO, and other styles
14

Wei, Yu-Chi, Yu-Chun Chang, and Wei-Chen Wu. "Multi-language IoT information security standard item matching based on deep learning." Computer Science and Information Systems 21, no. 2 (2024): 663–83. http://dx.doi.org/10.2298/csis230822012w.

Full text
Abstract:
In the realm of IoT information security and other domains, various information security standards exist, such as the IEC 62443 series standards published by the International Electrotechnical Commission and ISO/IEC 27001 by the International Organization for Standardization. Business organizations are striving to improve and protect their operations through the implementation and study of these information security standards. However, comparing or pinpointing applicable control measures is becoming increasingly labor-intensive and prone to errors or deviations, especially given the plethora o
APA, Harvard, Vancouver, ISO, and other styles
15

Hassani, Hicham Lalaoui, Ayoub Bahnasse, Eric Martin, Christian Roland, Omar Bouattane, and Mohammed El Mehdi Diouri. "Vulnerability and security risk assessment in a IIoT environment in compliance with standard IEC 62443." Procedia Computer Science 191 (2021): 33–40. http://dx.doi.org/10.1016/j.procs.2021.07.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gyebnár, Gergő. "Building an OT Security Microgrid Testbed." Academic and Applied Research in Military and Public Management Science 23, no. 3 (2024): 5–19. https://doi.org/10.32565/aarms.2024.3.1.

Full text
Abstract:
This paper introduces the development of an Operational Technology (OT) security microgrid testbed. The testbed is aligned with the IEC 62443 standard and structured to simulate and mitigate potential security risks within OT systems. It serves as a platform for evaluating cybersecurity strategies through test scenarios and cases, aimed at enhancing the resilience and responsiveness of OT environments to cyber threats. The work described here lays the foundational framework for subsequent research, focusing on cybersecurity measures, including MITRE ATT&CK-based methodologies and detection
APA, Harvard, Vancouver, ISO, and other styles
17

Okunlola, Folasade. "A Cyber-Physical Framework for Data Assurance and Emergency Response Readiness in Critical Energy Infrastructure." Journal of Engineering and Applied Sciences 4, no. 1 (2025): 1–10. https://doi.org/10.70560/6ag3wg21.

Full text
Abstract:
The increasing digitization of critical energy infrastructure has amplified the need for integrated frameworks that ensure data reliability and operational readiness during emergencies. This paper proposes a novel Cyber-Physical Data Assurance Framework that unifies data governance, real-time analytics, and emergency coordination across digital and physical systems. The framework is architected into four functional layers—Data, Governance, Analytics, and Interface—each designed to preserve data integrity, enhance situational awareness, and synchronize field operations with control systems. Usi
APA, Harvard, Vancouver, ISO, and other styles
18

Grant Quansah, Samuel. "Securing Oil & Gas Digital Supply Chains: A Vendor Risk Management Framework for IoT and Cyber-Physical Systems." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 8, no. 1 (2025): 264–80. https://doi.org/10.60087/jaigs.v8i1.389.

Full text
Abstract:
The oil and gas industry’s accelerated digital transformation—driven by cloud computing, IoT, and edge technologies—has significantly expanded the attack surface, with third-party vendors emerging as critical points of vulnerability. Existing frameworks, such as NIST CSF and ISO/IEC 27036, while comprehensive, fall short of addressing the sector’s unique cyber-physical infrastructure and real-time operational demands. This study addresses that gap by proposing the Vendor Cyber Risk Management Framework (VCRMF), a domain-specific model that integrates dynamic vendor tiering, continuous threat m
APA, Harvard, Vancouver, ISO, and other styles
19

Shaaban, Abdelkader Magdy, Sebastian Chlup, Nahla El-Araby, and Christoph Schmittner. "Towards Optimized Security Attributes for IoT Devices in Smart Agriculture Based on the IEC 62443 Security Standard." Applied Sciences 12, no. 11 (2022): 5653. http://dx.doi.org/10.3390/app12115653.

Full text
Abstract:
Implementing applicable security measures into system engineering applications is still one of the most challenging processes in building secure infrastructure. This process needs to consider a variety of security attributes to support securing system components against numerous cyberattacks that could exploit vulnerable points in the system. The redundancy in these attributes is also another challenge that could degrade system functionality and impact the availability of the system’s services. Therefore, it is crucial to choose appropriate security properties by considering their ability to a
APA, Harvard, Vancouver, ISO, and other styles
20

Marjanovic, Jelena, Nikola Dalcekovic, and Goran Sladic. "Blockchain-based model for tracking compliance with security requirements." Computer Science and Information Systems, no. 00 (2022): 60. http://dx.doi.org/10.2298/csis210923060m.

Full text
Abstract:
The increasing threat landscape in Industrial Control Systems (ICS) brings different risk profiles with comprehensive impacts on society and safety. The complexity of cybersecurity risk assessment increases with a variety of third-party software components that comprise a modern ICS supply chain. A central issue in software supply chain security is the evaluation whether the secure development lifecycle process (SDL) is being methodologically and continuously practiced by all vendors. In this paper, we investigate the possibility of using a decentralized, tamper-proof system that will provide
APA, Harvard, Vancouver, ISO, and other styles
21

Mateo Sanguino, Tomás de J. "Enhancing Security in Industrial Application Development: Case Study on Self-Generating Artificial Intelligence Tools." Applied Sciences 14, no. 9 (2024): 3780. http://dx.doi.org/10.3390/app14093780.

Full text
Abstract:
The emergence of security vulnerabilities and risks in software development assisted by self-generated tools, particularly with regard to the generation of code that lacks due consideration of security measures, could have significant consequences for industry and its organizations. This manuscript aims to demonstrate how such self-generative vulnerabilities manifest in software programming, through a case study. To this end, this work undertakes a methodology that illustrates a practical example of vulnerability existing in the code generated using an AI model such as ChatGPT, showcasing the
APA, Harvard, Vancouver, ISO, and other styles
22

Mugarza, Imanol, Jose Luis Flores, and Jose Luis Montero. "Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era." Sensors 20, no. 24 (2020): 7160. http://dx.doi.org/10.3390/s20247160.

Full text
Abstract:
New generation Industrial Automation and Control Systems (IACS) are providing advanced connectivity features, enabling new automation applications, services and business models in the Industrial Internet of Things (IIoT) era. Nevertheless, due to the extended attack surface and increasing number of cyber-attacks against industrial equipment, security concerns arise. Hence, these systems should provide enough protection and resiliency against cyber-attacks throughout their entire lifespan, which, in the case of industrial systems, may last several decades. A sound and complete management of sec
APA, Harvard, Vancouver, ISO, and other styles
23

Kristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz, and Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications." Applied Sciences 11, no. 13 (2021): 5841. http://dx.doi.org/10.3390/app11135841.

Full text
Abstract:
Cybersecurity is an important field in our digital world. It protects computer systems and communication networks against theft or sabotage of information to guarantee trouble-free operation in a trustworthy working environment. This article gives an overview of a cybersecurity assessment process and an appropriate Cybersecurity Management (CSM) implementation for future digital agriculture applications. The cybersecurity assessment follows the IEC 62443 cybersecurity standard for Industrial Automation Control Systems (IACS), adapted to Agriculture Automation Control Systems (AACS). However, t
APA, Harvard, Vancouver, ISO, and other styles
24

Egho-Promise, Ehigiator, Emmanuel Lyada, and Folayo Aina. "Towards Improved Vulnerability Management in Digital Environments: A Comprehensive Framework for Cyber Security Enhancement." International Research Journal of Computer Science 11, no. 05 (2024): 441–49. http://dx.doi.org/10.26562/irjcs.2024.v1105.01.

Full text
Abstract:
This study aimed at developing a comprehensive framework that enhances cyber security and improves vulnerability management in a digital environment. The study reviewed the challenges of vulnerability management in digital environments, with a focus on cyber-physical power systems (CPPS). Through a comprehensive literature review, existing Cyber Security frameworks like NIST, ISO 27001, and ISA/IEC 62443 were evaluated based on their applicability to CPPS. Key vulnerabilities and threat vectors unique to the integration of operational technology and information technology in CPPS were identifi
APA, Harvard, Vancouver, ISO, and other styles
25

Abergos, Van Joshua, and Faiza Medjek. "A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN." Journal of Cybersecurity and Privacy 4, no. 4 (2024): 910–37. http://dx.doi.org/10.3390/jcp4040042.

Full text
Abstract:
This paper introduces a comprehensive risk assessment of various wide area network (WAN) technologies as applied to Operational Technology (OT) infrastructures, thus uncovering which WAN technology is best suited for OT to mitigate the risks of Denial of View (DoV), Denial of Control (DoC), and Denial of Service (DoS). A new risk weight-based evaluation approach is proposed following NIST CSF and ISA/IEC 62443 standard risk scoring (RS). In this approach, RS was modified by introducing new risk metrics, namely, risk (Rn), mitigation (Mm), risk prioritization (WRn), and mitigation prioritizatio
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Ying-Chin, Chia-Hao Cheng, Tzu-Wei Lin, and Jung-San Lee. "Diverse Machine Learning-Based Malicious Detection for Industrial Control System." Electronics 14, no. 10 (2025): 1947. https://doi.org/10.3390/electronics14101947.

Full text
Abstract:
The digital transformation of manufacturing through OT, IoT, and AI integration has created extensive networked sensor ecosystems, introducing critical cybersecurity vulnerabilities at IT-OT interfaces. This might particularly challenge the detection component of the NIST cybersecurity framework. To address this concern, the authors designed a diverse machine learning-based intrusion detection system framework for industrial control systems (DICS). DICS implements a sophisticated dual-module architecture. The screening analysis module initially categorizes network traffic as either unidentifia
APA, Harvard, Vancouver, ISO, and other styles
27

Olaitan, Ololade Funke, Ogheneruemu Nathaniel Akatakpo, Chukwujama Osinachi Victor, et al. "Secure and Resilient Industrial IoT Architectures for Smart Manufacturing: A Comprehensive Review." Journal of Engineering Research and Reports 27, no. 6 (2025): 331–44. https://doi.org/10.9734/jerr/2025/v27i61548.

Full text
Abstract:
Smart manufacturing, driven by the Industrial Internet of Things (IIoT), is transforming real-time data sharing, predictive maintenance, and process automation. However, the increasing complexity and connectivity of IIoT environments present significant security and resilience challenges that threaten operational safety, data integrity, and business continuity. This paper presents a comprehensive review of secure and resilient architectures for IIoT in smart manufacturing, highlighting the interaction between enabling technologies (e.g., edge computing, AI/ML, blockchain) and emerging threats
APA, Harvard, Vancouver, ISO, and other styles
28

Grant Quansah, Samuel. "Autonomous Cybersecurity for Edge Devices in Remote Oil & Gas Operations: A Resilience Framework for Low-Connectivity Environments." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 8, no. 02 (2025): 65–80. https://doi.org/10.60087/jaigs.v8i02.390.

Full text
Abstract:
The remote operation of oil and gas fields is being transformed by access to edge computing or Industrial Internet of Things (IIoT) devices that allow real-time processing in harsh low-bandwidth areas. But this progress brings new almost-existentially perilous cyber security threats that classical cloud-centric security frameworks and models fail to take care of. In the current paper, an autonomous, resilience-driven cybersecurity model that incorporates endpoint hardening, local threat detection based on AI, decentralized authentication, opportunistic synchronization is proposed. Our model, u
APA, Harvard, Vancouver, ISO, and other styles
29

Halenar, Igor, Lenka Halenarova, and Pavol Tanuska. "Communication Safety of Cybernetic Systems in a Smart Factory Environment." Machines 11, no. 3 (2023): 379. http://dx.doi.org/10.3390/machines11030379.

Full text
Abstract:
The aim of this contribution is to propose the architecture for a layered design of the production system. This proposal uses the IEC 62443 norm, including the Defense-in-Depth strategy and proven technical principles applicable in a Smart Factory with a focus on communication security. Firstly, the identification of communication forms and trends in the Smart Factory environment was identified considering the spectrum of communication protocols used within various types of automation structures used in modern production facilities. The next part of the work deals with the definition of wired
APA, Harvard, Vancouver, ISO, and other styles
30

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
31

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
32

Haridy, Ahmed Abuelfadl Ahmed. "Integrated Policing in Critical Infrastructure Protection: Bridging Intelligence and Field Operations." American Journal of Political Science Law and Criminology 07, no. 05 (2025): 206–15. https://doi.org/10.37547/tajpslc/volume07issue05-22.

Full text
Abstract:
This article examines contemporary challenges in protecting critical infrastructure, driven by the rapid growth of “hybrid” cyber-physical attacks and chronic gaps in intelligence sharing between strategic analysts and field response teams. The study aims to analyze existing legal and regulatory frameworks in the United States and the European Union, assess the technological capabilities of a “digital twin” of CNI assets, and identify key barriers to translating threat analyses into on-site operational actions. The relevance of this work is underscored by statistics from Europol, KnowBe4, Chec
APA, Harvard, Vancouver, ISO, and other styles
33

Kovalenko, O. Ye. "Security models of the Internet of Things." Mathematical machines and systems 4 (2023): 43–50. http://dx.doi.org/10.34121/1028-9763-2023-4-43-50.

Full text
Abstract:
The IoT is a cyber-convergent system that includes things, means of communication, target ap-plications, and data analysis tools that support the unique identification of each object. IoT technologies play a vital role in the creation of cyber-convergent systems due to their wide us-age in various spheres of life such as industry, social sphere, health care, and creating a com-fortable environment. The IoT security model method ensures the confidentiality, integrity, and availability of data that is transferred between devices and also guarantees the privacy and secu-rity of end users. The cre
APA, Harvard, Vancouver, ISO, and other styles
34

Stojkov, Milan, Nikola Dalčeković, Branko Markoski, Branko Milosavljević, and Goran Sladić. "Towards Cross-Standard Compliance Readiness: Security Requirements Model for Smart Grid." Energies 14, no. 21 (2021): 6862. http://dx.doi.org/10.3390/en14216862.

Full text
Abstract:
The critical infrastructure is constantly under cyber and physical threats. Applying security controls without guidance or traceability can create a false sense of security. Security standards facilitate security knowledge and control best practices in a more systematic way. However, the number of standards is continually increasing. Product providers that operate in multiple geographical regions often face the obligation to comply with multiple standards simultaneously. This introduces the problem of the convenient interpretation of different standards. Thus, a comprehensive analysis of the r
APA, Harvard, Vancouver, ISO, and other styles
35

Figueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (2019): 4455. http://dx.doi.org/10.3390/s19204455.

Full text
Abstract:
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence compan
APA, Harvard, Vancouver, ISO, and other styles
36

Nuruzzaman, Md, and Sohel Rana. "IOT-ENABLED CONDITION MONITORING IN POWER DISTRIBUTION SYSTEMS: A REVIEW OF SCADA-BASED AUTOMATION, REAL-TIME DATA ANALYTICS, AND CYBER-PHYSICAL SECURITY CHALLENGES." Journal of Sustainable Development and Policy 01, no. 01 (2025): 25–43. https://doi.org/10.63125/pyd1x841.

Full text
Abstract:
The evolution of modern power distribution systems has been profoundly influenced by the rapid integration of Internet of Things (IoT) technologies, which enable advanced condition monitoring, enhance operational visibility, and facilitate early fault detection across critical infrastructure. This systematic review investigates the multifaceted role of IoT in transforming conventional Supervisory Control and Data Acquisition (SCADA) systems into intelligent, interoperable platforms that support automation, real-time analytics, and adaptive control within power distribution networks. Emphasis i
APA, Harvard, Vancouver, ISO, and other styles
37

Carpenter, Chris. "Industrial Cybersecurity, Process Safety, and Human Factors: A 360° Approach." Journal of Petroleum Technology 76, no. 08 (2024): 79–82. http://dx.doi.org/10.2118/0824-0079-jpt.

Full text
Abstract:
_ This article, written by JPT Technology Editor Chris Carpenter, contains highlights of paper OTC 35396, “Industrial Cybersecurity, Process Safety, and Human Factors: A Comprehensive 360° Approach,” by Pedro F. Vieira, Lenissa P. Hilgert, and Ilton Majerowicz, Petrobras. The paper has not been peer reviewed. Copyright 2024 Offshore Technology Conference. _ The complete paper presents an integrated view of three key areas of knowledge that are typically addressed individually—cybersecurity, process safety, and human factors—from the perspective of cybersecurity. It discusses information techno
APA, Harvard, Vancouver, ISO, and other styles
38

Johansson, Erik. "Securing the industrial cyber space with IEC 62443." Engineering & Technology Reference, March 2, 2016. http://dx.doi.org/10.1049/etr.2015.0140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Da Silva, Mike, Stéphane Mocanu, Maxime Puys, and Pierre-Henri Thevenon. "Safety-security convergence: Automation of IEC 62443-3-2." Computers & Security, April 2025, 104477. https://doi.org/10.1016/j.cose.2025.104477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Feistle, Friedrich, Martin Kursawe, Daniel Luedicke, and Juergen Sept. "OT-Security – Harmonisierter Bedrohungskatalog am Beispiel Schienenfahrzeuge." ZEVrail Zeitschrift für das gesamte System Bahn, 2024. https://doi.org/10.62682/vftn3956.

Full text
Abstract:
Das Themengebiet „Cybersecurity“ gewinnt im Kontext der zunehmenden Digitalisierung im Eisenbahnsektor an immer größerer Bedeutung. Vor diesem Hintergrund sind alle Stakeholder in dieser Domäne daran interessiert eine Einschätzung über die IT- / OT- Security zu erhalten. Unterstützung liefern dabei die Industrienorm IEC 62443 [1] und die darauf aufbauende Richtlinie für Bahnen TS 50701 [2]. Bei beiden erfolgt der Nachweis der OT-Security bevorzugt über eine Risikoanalyse auf Basis der zu erwartenden Bedrohungen. Weder die IEC 62443 noch die TS 50701 liefert hierzu eine verbindliche Vorgabe in
APA, Harvard, Vancouver, ISO, and other styles
41

Kemp, Robert, and Richard Smith. "Audit, Validation, Verification and Assessment for Safety and Security Standards." Journal of Cybersecurity and Information Management, 2021, 22–50. http://dx.doi.org/10.54216/jcim.070103.

Full text
Abstract:
Internal auditing is important for ensuring compliance to multiple safety and security standards. The problem is that although safety and security have similarities when it comes to auditing, they also have differences that makes auditing both areas under the same process difficult. This paper has shown how to overcome those differences and leverage the similarities to create one auditing process for both safety and security. The paper has harmonized the different terminology between safety and security and showed how the new auditing process can allow compliance to IEC 61508, ISO 27001 and IE
APA, Harvard, Vancouver, ISO, and other styles
42

Gaggero, Giovanni Battista, Alessandro Armellin, Paola Girdinio, and Mario Marchese. "An IEC 62443-Based Framework for Secure-by-Desing Energy Communities." IEEE Access, 2024, 1. http://dx.doi.org/10.1109/access.2024.3492316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pantoni, Rodrigo Palucci, Eduardo André Mossin, Victor Teixeira C. Halfeld, et al. "Design and implementation of O-PAS user-defined function blocks." Journal of Electrical Systems and Information Technology 11, no. 1 (2024). https://doi.org/10.1186/s43067-024-00183-9.

Full text
Abstract:
AbstractIn recent decades, standardisation has become crucial in Industrial Automation Systems, promoting interoperability among devices from different manufacturers. Nonetheless, the portability of manufacturing engineering tools continues to present a significant challenge. AutomationML (IEC 62714 -5) has played a role in formulating strategies that leverage O-PAS Standard Function Blocks. The O-PAS specification includes several standards, such as IEC 62443, IEC 61499, IEC 61131–3, OPC-UA (Open platform communications unified architecture), DCS (Distributed control system), and PLC (Program
APA, Harvard, Vancouver, ISO, and other styles
44

Makrakis, Georgios Michail, Dakota Roberson, Constantinos Kolias, and Dallin Cook. "Evaluation of SDN security measures in the context of IEC 62443-3-3." International Journal of Critical Infrastructure Protection, August 2024, 100716. http://dx.doi.org/10.1016/j.ijcip.2024.100716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hazell, Peter M. C. "Integrating IEC 62443 cyber security with existing industrial process and functional safety management systems." Engineering & Technology Reference 1, no. 1 (2012). http://dx.doi.org/10.1049/etr.2016.0029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Abraham, Doney, Øyvind Toftegaard, Binu Ben Jose D. R., Alemayehu Gebremedhin, and Sule Yildirim Yayilgan. "Consequence simulation of cyber attacks on key smart grid business cases." Frontiers in Energy Research 12 (July 3, 2024). http://dx.doi.org/10.3389/fenrg.2024.1395954.

Full text
Abstract:
The increasing threat of cyber-attacks on modern power systems highlights the need for a comprehensive examination through simulations. This study conducts an in-depth simulation of cyber-attacks on critical smart grid components, including smart meters, substation automation, and battery management systems, to expose and analyze potential disruptions to power system operations. We identify vulnerabilities that can lead to severe grid instabilities, such as voltage variations, system collapses, and inverter failures. Our analysis underscores the complex interactions between cyber threats and g
APA, Harvard, Vancouver, ISO, and other styles
47

Hoff, Rainer, and Kathy Shell. "Environmental, social, governance: The future of process safety management or repeat of the past?" Process Safety Progress, September 16, 2023. http://dx.doi.org/10.1002/prs.12535.

Full text
Abstract:
AbstractSites have implemented process safety management (PSM) systems, initially for Occupational Safety and Health Administration (OSHA) PSM and the Environmental Protection Agency (EPA) risk management program (RMP) compliance. Then later, they adapted those systems for risk‐based process safety (RBPS). They discovered the power of leveraging these foundational systems of procedures, tools, and practices for numerous follow‐on initiatives: for example, action management, API‐1173, SIS/IEC‐61511; cybersecurity/IEC 62443; API‐754/Vision 2020 metrics; ISO 14001. Today, companies are increasing
APA, Harvard, Vancouver, ISO, and other styles
48

Mirko, Caruso. "Progettazione di Sicurezza in Operational Technology: Applicazioni Militari dello Standard ISA-62443." November 8, 2023. https://doi.org/10.5281/zenodo.10085676.

Full text
Abstract:
Lo standard ANSI/ISA-62443 è fondamentale per la sicurezza dei sistemi di automazione e controllo industriale, con applicazioni in vari settori e riconosciuto anche per la protezione delle infrastrutture critiche NATO. Centrali allo standard sono i concetti di Security Level (SL) e Security Level Target (SL-T), che guidano l'implementazione delle misure di sicurezza in relazione alla valutazione delle minacce.La determinazione di SL-T può avvenire tramite diversi approcci, inclusa l'analisi qualitativa basata su matrici di rischio, ma la mancanza di un metodo prescritto può portare a incoerenz
APA, Harvard, Vancouver, ISO, and other styles
49

Brancati, Francesco, Diamantea Mongelli, Francesco Mariotti, and Paolo Lollini. "A cybersecurity risk assessment methodology for industrial automation control systems." International Journal of Information Security 24, no. 2 (2025). https://doi.org/10.1007/s10207-025-00990-9.

Full text
Abstract:
Abstract Industrial automation control systems (IACS) are employed in current critical infrastructures and industrial plants spanning very different domains, and the transformation process towards Industry 4.0 is further increasing the dependencies on such systems. Since IACS can be exposed to malicious threats that could lead to catastrophic consequences, it is extremely important to assess the cybersecurity risk of these systems, to identify the possible threats, their impact, likelihood, and possible countermeasures. The ISA/IEC 62443 series of standards is suited for the design and securit
APA, Harvard, Vancouver, ISO, and other styles
50

Fernández Píriz, Lourdes, Ramón García, and Juan Manuel Escaño González. "Protecci´on de sistemas dom´oticos frente a ciberataques mediante sistemas de inferencia neuroborrosos." Simposios del Comité Español de Automática (CEA) 1, no. 2 (2025). https://doi.org/10.64117/simposioscea.v1i2.99.

Full text
Abstract:
Este trabajo presenta una arquitectura de control resiliente para entornos dom´oticos inteligentes sometidos a ciberataques. Lasoluci´on propuesta integra un sistema de inferencia neuroborroso adaptativo (ANFIS) directamente en un PLC, con el objetivo deestimar la temperatura real de una habitaci´on incluso cuando los datos de los sensores han sido manipulados. El modelo ANFISposee una estructura autoregresiva que incorpora estimaciones anteriores y temperaturas de estancias contiguas, lo que le permite detectar anomal´ıas provocadas por ataques de tipo Man-in-the-Middle e inyecci´on de datos.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!