AbuEmera et al., 2022 - Google Patents
Security framework for identifying threats in smart manufacturing systems using STRIDE approachAbuEmera et al., 2022
- Document ID
- 8487388778688086595
- Author
- AbuEmera E
- ElZouka H
- Saad A
- Publication year
- Publication venue
- 2022 2nd International conference on consumer electronics and computer engineering (ICCECE)
External Links
Snippet
Cyber security is still the main argument in any system development lifecycle that needs more concern. There are still numerous challenges associated with conducting a threat modeling approach for smart manufacturing systems. One of these challenges is the lack of …
- 238000004519 manufacturing process 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Moudoud et al. | Prediction and detection of FDIA and DDoS attacks in 5G enabled IoT | |
US20240073242A1 (en) | Cyber security appliance for an operational technology network | |
Gao et al. | SCADA communication and security issues | |
Ahmed et al. | Scada systems: Challenges for forensic investigators | |
AbuEmera et al. | Security framework for identifying threats in smart manufacturing systems using STRIDE approach | |
Fan et al. | Overview of cyber-security of industrial control system | |
Meshram et al. | Anomaly detection in industrial networks using machine learning: a roadmap | |
Settanni et al. | Protecting cyber physical production systems using anomaly detection to enable self-adaptation | |
CN115150208B (en) | Zero-trust-based Internet of things terminal secure access method and system | |
Ferencz et al. | Review of industry 4.0 security challenges | |
Davidson et al. | On SCADA PLC and fieldbus cyber-security | |
CN111193738A (en) | Intrusion detection method of industrial control system | |
Dondossola et al. | Effects of intentional threats to power substation control systems | |
Rekik et al. | A cyber-physical threat analysis for microgrids | |
Liebl et al. | Threat analysis of industrial internet of things devices | |
Al Baalbaki et al. | Autonomic critical infrastructure protection (acip) system | |
Calvo et al. | Key Vulnerabilities of Industrial Automation and Control Systems and Recommendations to Prevent Cyber-Attacks. | |
Kamal et al. | Identifying and scoring vulnerability in scada environments | |
Mesbah et al. | Cyber threats and policies for industrial control systems | |
Irmak et al. | Experimental analysis of the internal attacks on scada systems | |
CN111338297B (en) | Industrial control safety framework system based on industrial cloud | |
Pricop | Security of industrial control systems-an emerging issue in romania national defense | |
Lekidis | Cyber-attack TTP analysis for EPES systems | |
Paul et al. | Overview of Cyber Security in Intelligent and Sustainable Manufacturing | |
Marković-Petrović | Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems |