AI & SOCIETY

pp 1–11 | Cite as

Mitigating risks of digitalization through managed industrial security services

Original Article
  • 38 Downloads

Abstract

Digitalization has become a cornerstone of competitiveness in the industrial arena, especially in the cases of small lot sizes with many variants in the goods produced. Managers of industrial facilities have to handle the complexity that comes along with Industry 4.0 in diverse dimensions to leverage the potentials of digitalization for their sites. This article describes major drivers of this complexity in current industrial automation to outline the environment of today’s challenges for managers of this technical transition—and shows how managed industrial security services can contribute to stabilize the industrial system. An outlook is given to future automation scenarios as well as the major concepts involved in their protection.

Keywords

Digitalization Industrial cyber security IT security Managed Services Cyber security operation center Managed security services provider (MSSP) 

References

  1. Berners-Lee T et al (2001) The Semantic Web. Scientific American, May 2001Google Scholar
  2. BSI (2014) UP KRITIS Öffentlich-Private Partnerschaft zum Schutz Kritischer Infrastrukturen. Bundesamt für Sicherheit in der Informationstechnik, BonnGoogle Scholar
  3. Colombo AW et al (2014) Industrial cloud-based cyber-physical systems: the IMC-AESOP approach. Springer, HeidelbergCrossRefGoogle Scholar
  4. COM (2006) Communication from the commission on a European programme for critical infrastructure protection. COM(2006) 786 final. Commission of the European Communities, BrusselsGoogle Scholar
  5. Fiampolis P, Groll J (2016) Bringing together dev and ops. http://www.trainingjournal.com Accessed 23 April 2016
  6. Fuhrmans V (2010) Virus attacks siemens plant-control systems. The Wall Street Journal, July 22Google Scholar
  7. Gartner (2015). Principles and practices of DevOps. https://www.gartner.com/doc/3004719/principles-practices-devops, published 12th March 2015
  8. Geisberger E, Broy M (2012) agendaCPS—Integrierte Forschungsagenda Cyber-Physical Systems. acatech—Deutsche Akademie der Technikwissenschaften e.V., München/GarchingGoogle Scholar
  9. Goltz U et al (2015) Design for future: managed software evolution. In: Glesner S (ed) Computer science—research and development. Springer, Heidelberg and BerlinGoogle Scholar
  10. Hu F et al (2016) Robust cyber-physical systems: concept, models and implementation. In: Future generation computer systems, vol 56, Elsevier, Amsterdam pp 449–475Google Scholar
  11. Huber A (2013) Das Ziel Digital Enterprise: die professionelle digitale Abbildung von Produktentwicklung und Produktion. In: Industry 4.0. Springer, Berlin, pp 111–124Google Scholar
  12. Karnouskos S (2011). Stuxnet worm impact on industrial cyber-physical system security. In: 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), 7–10 Nov 2011, Melbourne, AustraliaGoogle Scholar
  13. Koscher K et al (2010) Experimental security analysis of a modern automobile. In: Proceedings of the 31st IEEE symposium on security and privacyGoogle Scholar
  14. Leavitt N (2010) Researchers fight to keep implanted medical devices save from hackers. Computer 34(8):11–14CrossRefGoogle Scholar
  15. Mills E (2009) Hackers broke into FAA air traffic control systems. The Wall Street Journal, p A6Google Scholar
  16. Müller-Schloer et al (2004) Organic computing. Informatik-Spektrum, vol 27, 4, 332–336Google Scholar
  17. O’Connell K (2008). CIA Report: cyber extortionists attacked foreign power grid, disrupting delivery. Internet Business Law ServicesGoogle Scholar
  18. Siemens (2016) Security concept for process and discrete industries. http://www.industry.siemens.com/topics/global/en/industrial-security/Documents/Whitepaper_Security_2016_V10_EN.pdf. Accessed 18 Jan 2017
  19. Wan K et al (2010) Specification, analyzing challenges and approaches for cyber-physical systems (CPS). Eng Lett 18(3):308–315Google Scholar
  20. Zimmerman C (2014) Ten strategies of a world-class cybersecurity operations center. The MITRE Corporation, BedfordGoogle Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2018

Authors and Affiliations

  1. 1.Siemens AG, Digital Factory DivisionErlangenGermany
  2. 2.Cybernetics Lab IMA/ZLW & IfURWTH Aachen UniversityAachenGermany

Personalised recommendations