Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

Size: px
Start display at page:

Download "Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security"

Transcription

1 Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2 D Darmstadt anderl@dik.tu-darmstadt.de Tel: June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 1

2 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 2

3 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 3

4 Fachgebiet Datenverarbeitung in der Konstruktion (DiK) Computer Integrated Design Overview: Computer Integrated Design Head: Prof. Dr.-Ing. R. Anderl 20 Research Assistants 5 Technical and Administrative Staff, ~ 50 Teaching Assistents International Competence and Experience in the Fields of: Virtual Product Development using Smart Engineering, Product Lifecycle Management Process Integration / Optimization Industrie 4.0 June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 4

5 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 5

6 Industrie 4.0 First Programmable Logic Controller (PLC) Modicon Industrial Revolution based on Cyber-Physical Systems 4th Industrial Revolution First mechanical loom 1784 First assembly line Union Stock Yards Industrial Revolution by introduction of shared mass-prodution with help of electric energy 3. Industrial Revolution by electronics and IT for enhanced automization in production 3rd Industrial Revolution 2nd Industrial Revolution Level of Complexity 1. Industrial Revolution by introduction of manufacturing plants with help of hydro power and steam power 1st Industrial Revolution End of Beginning of Beginning of the Today time 18th Century 20th Century 1970s Source: Kagermann, H.; Wahlster, W.; Held, J.; (Hrsg.) : Bericht der Promotorengruppe Kommunikation. Im Fokus: Das Zukunftsprojekt Industrie 4.0. Forschungsunion, 2012 June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 6

7 The Vision of Industrie 4.0 Recommendations for implementing Industrie 4.0 Establish value-added networks June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 7

8 Use Cases for Smart Applications communicating and self-controlling systems monitoring functional integration cyber-physical systems June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 8

9 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 9

10 Cyber Physical Systems Cyber Physical Systems are resulting from two views: cyberizing the physical for specifying physical subsystems with computational abstractions and interfaces and physicalizing the cyber for expressing abstractions and interfaces of software and network components to represent physical systems dynamics in time [LEE2010] June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 10

11 Industrie 4.0: Cyber-Physical Systems Embedded Systems enabling CPS and CPPS Smart Sensors Smart Systems (Smart Sensors and Actuators) Cyber Physical Systems (CPS) Cyber Physical Production Systems (CPPS) Embedded System June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 11

12 Industrie 4.0: Internet technologies Internet of Things, Services and Data Internet of Things (IoT) Communicating objects based on internet technologies Detection and identification using IPv6-addresses (128 bit address space) Advantages: Detection, identification and location of physical objects Communication through connectivity Every physical object might be equipped with an IPv6-address Internet of Sevices (IoS) New approach to provide internet based services Concepts for product specific services on demand, knowledge provision and services for controlling product behaviour Interaction between people, machines and systems to improve added value Internet of Data (IoD) Service based added value processes Data is managed and shared using internet technologies Cyber-physical systems are producing big data Fundamental prerequisite: Development of a holistic security and safety culture establish sustainable trusted environments Smart Logistics Manage big data: integrate product and production data June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 12 Smart Production Procecces Smart Engineering

13 Don t forget Industrie 4.0 People! Human centric environments Continuous learning and advanced qualification paths from professional qualification to academic qualification Networks of good pratice Knowledge and competence building on the job Job enrichment Interdisciplinary awareness, thinking and understanding Agile skills (delta engineering to adapt appropriate skills) June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 13

14 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 14

15 Holistic Approach for Security and Safety Application Layer Safe and secure Industrie 4.0-processes System Layer Safe and secure cyber-physical systems Safe and secure things Reliable and robust machine control Authentification Attestation Integrity Safe and secure Data Encryption Signed data Unforgeability Safe and secure Sevices Usage policy enforcement Trusted providers and owners Trusted environments User identity Technology Layer June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 15

16 Synchronous and Asynchronous Operation smart sensor sensors real time synchronous operation Established IT-security methods asynchronous operation internet of Data internet of Services smart actuator Control units continuous processes discrete processes G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y data exchange cryptography actuators Heute: Trennung von Sicherheits- und Echtzeitwelt future systems require IT safety and security closely tied to physical processes June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 16

17 Industrie 4.0: Security CPS layer model Knowledge theft Social engineering Phishing Staff training for knowledge protection and IT security competence Protocol analyzer DDoS Network intrusion Man in the Middle Unencrypted streams Firewalls Network-Intrusion Detection Encrypt data transmissions Side-channel attacks Hardware protection IT-Security Evaluation Common Criteria (EAL-CC) Logic analysis Signal recording Active components tampering Malware protection Antivirus software Malware Trojans, Worms Decompiling Malcode injection Memory editing Sandboxing, Memory integrity checks Disassembling Reverse Engineering Encryption of program resources Obfuscation, masking Integrity and plausability checks for active components June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 17

18 Use Case Additive Manufacturing June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 18

19 Industrie 4.0 Internet based Services Cyber-Physical Production Systems (CPPS) June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 19

20 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 20

21 Platform Industrie Quelle: Plattform Industrie 4.0 ( June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 21

22 Scientific Advisory Board: 17 Assumptions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 22

23 Research Roadmap of the Platform Industrie Horizontal integration via value creation networks Seamless engineering throughout life cycle MIGRATION STRATEGY Methods for new business models Automation of value creation networks Integration of real and virtual worlds Systems Engineering Methods for framework Value creation networks INDUSTRY 4.0 by DESIGN Vertical integration and networked production systems Sensor data analysis and derivation of data-based process control system Intelligence - Flexibility - Adaptability New social infrastructures for work Multimodal assistant systems Acceptance of technology and nature of work Continuous development of hybrid technologies Wireless communication for Industry 4.0 scenarios Security & safety Industry 4.0 platform with reference architectures and decentralized service-oriented architecture June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 23

24 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 24

25 Conclusions Smart Products and Smart Factories are key targets of the German national strategy Industrie 4.0 Key strategy of Industrie 4.0 is the creation of new innovation for smart products and smart production systems based on the integration of internet based communication and embedded control software Safety and security is a fundamental concern to be solved and has to be an integral part of each and every development approach for smart products and smart production systems as well Future research activities will also need to address - knowledge protection, - new business models as well as - human factors for Industrie 4.0. June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 25

26 Source: Potthast Fachschaftenkonferenz June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 26

What is Industrie 4.0

What is Industrie 4.0 What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2

More information

What is Industrie 4.0 and how will it create the new growth?

What is Industrie 4.0 and how will it create the new growth? What is Industrie 4.0 and how will it create the new growth? Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität

More information

IoT in Production. Dr. Verena Majuntke, Bosch Software Innovations. Bosch Software Innovations

IoT in Production. Dr. Verena Majuntke, Bosch Software Innovations. Bosch Software Innovations IoT in Production Dr. Verena Majuntke, 1 Public INST/MKC 07.2014 GmbH 2014. All rights reserved, also regarding any disposal, Agenda The Internet of Things Internet of Things in Production Business Ecosystem

More information

A Modern Process Automation System Offers More than Process Control. Dick Hill Vice President ARC Advisory Group dhill@arcweb.com

A Modern Process Automation System Offers More than Process Control. Dick Hill Vice President ARC Advisory Group dhill@arcweb.com A Modern Process Automation System Offers More than Process Control Dick Hill Vice President ARC Advisory Group dhill@arcweb.com Modern Business Requirements Dynamic Customer Requirements Requiring Agility

More information

SAP Industry 4.0 & the Internet of Things Connected Manufacturing in Mill Products Industries. Chris Dorrow, May 2015

SAP Industry 4.0 & the Internet of Things Connected Manufacturing in Mill Products Industries. Chris Dorrow, May 2015 SAP Industry 4.0 & the Internet of Things Connected Manufacturing in Mill Products Industries Chris Dorrow, May 2015 Trends in an Industrial World Connected Devices Connected Processes Connected Business

More information

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014 Verfahren zur Absicherung von Apps Dr. Ullrich Martini IHK, 4-12-2014 Agenda Introducing G&D Problem Statement Available Security Technologies Smartcard Embedded Secure Element Virtualization Trusted Execution

More information

Industry 4.0 Vision to Reality Siemens AG 2015 siemens.com

Industry 4.0 Vision to Reality Siemens AG 2015 siemens.com Alan Norbury Siemens UK Industrial CTO Industry 4.0 Vision to Reality siemens.com Future of Manufacturing - Video http://www.siemens.co.uk/future-of-manufacturing Page 2 Industry 4.0.moving into a fourth

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes

Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Johannes Schöning Munich, Germany 10/2013 London Münster Berlin Köln Hasselt Saarbrücken Innovative Retail Lab (IRL)

More information

The Internet of Things and the future of manufacturing

The Internet of Things and the future of manufacturing JUNE 2013 Josh Cochran b u s i n e s s t e c h n o l o g y o f f i c e The Internet of Things and the future of manufacturing Executives at Robert Bosch and McKinsey experts discuss the technology-driven

More information

Industrie 4.0 The path from research to practice Unrestricted Siemens AG 2013. All rights reserved

Industrie 4.0 The path from research to practice Unrestricted Siemens AG 2013. All rights reserved Dr. Wolfgang Heuring, Head of Research and Technology Center Industrie 4.0 The path from research to practice Unrestricted Siemens AG 2013. All rights reserved Siemens is the driver of innovation in Automation

More information

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

Adapting to Change in the 4th Industrial Revolution. Graham Conlon Global Vice President, Extended Supply Chain, SAP

Adapting to Change in the 4th Industrial Revolution. Graham Conlon Global Vice President, Extended Supply Chain, SAP Adapting to Change in the 4th Industrial Revolution Graham Conlon Global Vice President, Extended Supply Chain, SAP Business Strategies Translating Business Realities to Business Strategies Personalized

More information

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center

More information

IO-Link an integral part in the next industrial revolution known as Industry 4.0

IO-Link an integral part in the next industrial revolution known as Industry 4.0 IO-Link an integral part in the next industrial revolution known as Industry 4.0 IO-Link an integral part in the next industrial revolution known as Industry 4.0 The manufacturing industry is on the verge

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Industry 4.0 Challenges and Opportunities

Industry 4.0 Challenges and Opportunities Industry 4.0 Challenges and Opportunities Institute of Industrial Management and Innovation Research Graz University of Technology 14 th International Conference on Knowledge Technologies and Data-driven

More information

Industry 4.0 the German vision for advanced manufacturing

Industry 4.0 the German vision for advanced manufacturing www.smartfactory-kl.de Industry 4.0 the German vision for advanced manufacturing Prof. Dr. Dr. h.c. Detlef Zühlke Director Innovative Factory Systems IFS German Research Center for Artificial Intelligence,

More information

Industrie 4.0 Engineering of IoT Applications for Indus trial Production

Industrie 4.0 Engineering of IoT Applications for Indus trial Production Industrie 4.0 Engineering of IoT Applications for Indus trial Production Internet of Things e Big Data Summit Milano, 11 June 2015 Dr.-Ing. Thomas Usländer Fraunhofer IOSB, Germany Josef von Fraunhofer

More information

Integration of Industry 4.0 in Education Programs of German Universities of Applied Science. Prof. Dr.-Ing. Rainer Würslin

Integration of Industry 4.0 in Education Programs of German Universities of Applied Science. Prof. Dr.-Ing. Rainer Würslin Integration of Industry 4.0 in Education Programs of German Universities of Applied Science Prof. Dr.-Ing. Rainer Würslin Agenda» The University of Applied Sciences Esslingen» The German Education- and

More information

Industry 4.0: Realization today with proven control architectures

Industry 4.0: Realization today with proven control architectures products PC Control 02 2013 PC-based control the ideal technology platform for the Internet of Things Industry 4.0: Realization today with proven control architectures PC Control 02 2013 products A revolution

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

Pervasive Computing und. Informationssicherheit

Pervasive Computing und. Informationssicherheit Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

CYBER PHYSICAL SYSTEMS@FRAUNHOFER IIS

CYBER PHYSICAL SYSTEMS@FRAUNHOFER IIS F R A U N H O F E R I N S T I T U T E F O R I N T E G R AT E D C I R C U I T S I I S CYBER PHYSICAL SYSTEMS@FRAUNHOFER IIS CPS@FRAUNHOFER IIS Cyber physical systems: it is no longer possible to separate

More information

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science

More information

2015-06-23 Susanne Timsjö at ABB Corporate Research The 4 th Industrial Revolution Internet of Things, Services and People

2015-06-23 Susanne Timsjö at ABB Corporate Research The 4 th Industrial Revolution Internet of Things, Services and People 2015-06-23 Susanne Timsjö at ABB Corporate Research The 4 th Industrial Revolution Internet of Things, Services and People June 30, 2015 Slide 1 User in focus! June 30, 2015 Slide 2 Next industrial revolution

More information

Factories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation

Factories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation Factories of the Future Horizon 2020: LEIT ICT WP2016-17 FoF-11-2016: Digital Automation Directorate General for Communication Networks, Content and Technology FoF PPP in Work Programme 2016-2017 FoF-11-2016:

More information

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group srsnitkin@arcweb.com Session Overview ARC Presentation

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single

More information

Shaping the Future of Production with Siemens: On the way to Industry 4.0

Shaping the Future of Production with Siemens: On the way to Industry 4.0 Shaping the Future of with Siemens: On the way to Industry 4.0 Member of the Managing Board of Siemens AG CEO Industry Sector Press Conference Hannover Messe 2013 April 8, 2013 Manufacturing is changing

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER

NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER Understanding what a PAC is starts from the understanding of PLC. A PLC is a Programmable Logic while

More information

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents

More information

Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems

Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems Summary of Main Findings of the Manufuture 13 Stamatis Karnouskos Input from Manufuture 2013 Session Presentations: Rolf

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Factories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation

Factories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation Factories of the Future Horizon 2020: LEIT ICT WP2016-17 FoF-11-2016: Digital Automation FoF PPP in Work Programme 2016-2017 FoF-11-2016: Digital automation FoF-12-2017: ICT Innovation for Manufacturing

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Smart Factories and IT Monitoring

Smart Factories and IT Monitoring Whitepaper Smart Factories and IT Monitoring Is Today s IT Monitoring Smart Enough for a Smart World? Contents Introduction... 3 What will be the role of IT in this new, smart world? 4 What are the next

More information

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Next Generation. VoIP Application Firewall. www.novacybersecurity.com

Next Generation. VoIP Application Firewall. www.novacybersecurity.com Next Generation VoIP Application Firewall Are you aware that you are vulnerable to all threats on the Internet? With increasing voice and video transmission over IP and emerging new technologies such as

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

Exploitation of Cyber-Physical Systems and Ambient Intelligence An Intel Business Perspective

Exploitation of Cyber-Physical Systems and Ambient Intelligence An Intel Business Perspective Exploitation of Cyber-Physical Systems and Ambient Intelligence An Intel Business Perspective Acatech: Integrated Research Agenda Cyber-Physical Systems April 12, 2012, EIT ICT Labs, Berlin Prof. Martin

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Securely Connect, Network, Access, and Visualize Your Data

Securely Connect, Network, Access, and Visualize Your Data Securely Connect, Network, Access, and Visualize Your Data 1 Who is Skkynet? Skkynet is the Parent company of; - Cogent Real-Time Systems Established in 1994 Focus on Industrial Automation software Cogent

More information

Industrie 4.0. The Aachen Approach

Industrie 4.0. The Aachen Approach Industrie 4.0 The Aachen Approach Axel Demmer Fraunhofer Institute for Production Technology IPT, Aachen (GER) Fraunhofer Additive Manufacturing Alliance Paradigm shifts lead to the announced fourth industrial

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Cyber Security and Science

Cyber Security and Science Cyber Security and Science Peter Weinberger pjw@googlecom Feb 9, 2011 These opinions are only mine, no one else s and even then, only today They may change at any time Protecting intellectual property

More information

M2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo

M2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo M2M The Next Industrial Revolution & Energy Transition Driver M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo MarComSo Short Profile Founded in 1997 Focus on M2M/IoT-, IT

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

Collaboration Accelerates the Internet of Things and Industry 4.0

Collaboration Accelerates the Internet of Things and Industry 4.0 Case Study BECKHOFF Collaboration Accelerates the Internet of Things and Industry 4.0 Driving Innovation in the Factory by Consolidating Systems with PC-Based Control Technology The number of connected

More information

Computer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree

Computer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree master s degree Computer Science Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! For us the world is flat. Electrical Engineering, Mathematics and Computer Science have

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Industrie 4.0 What can the UK learn from Germany s manufacturing strategy? 4 February 2014

Industrie 4.0 What can the UK learn from Germany s manufacturing strategy? 4 February 2014 Industrie 4.0 What can the UK learn from Germany s manufacturing strategy? 4 February 2014 @RAEngNews #Eng4Growth How Industrie 4.0 Will Coin the Economy of the Future. The Results of the German High-Tech

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Mobile RFID solutions

Mobile RFID solutions A TAKE Solutions White Paper Mobile RFID solutions small smart solutions Introduction Mobile RFID enables unique RFID use-cases not possible with fixed readers. Mobile data collection devices such as scanners

More information

Secure Machine to Machine Communication on the example of Smart Grids

Secure Machine to Machine Communication on the example of Smart Grids Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :

More information

WISE-4000 Series. WISE IoT Wireless I/O Modules

WISE-4000 Series. WISE IoT Wireless I/O Modules WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud

More information

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and, Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already

More information

Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...

Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things... Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet

More information

ENABLING RELIABLE COMMUNICATION FOR EMERGING M2M/IOT APPLICATIONS

ENABLING RELIABLE COMMUNICATION FOR EMERGING M2M/IOT APPLICATIONS ENABLING RELIABLE COMMUNICATION FOR EMERGING M2M/IOT APPLICATIONS Matthias Heyde / Fraunhofer FOKUS Dr.-Ing. Adel Al-Hezmi, Fraunhofer FOKUS M2M Summit 8. 9. Sep 2015, Düsseldorf AGENDA 1. Motivations

More information

How To Get A Computer Science Degree

How To Get A Computer Science Degree MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Multi-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids.

Multi-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids. Multi-Agent Systems Event Expert Forum Agents within the context of Industry 4.0 Industry 4.0 Machine Learning Material Handling Energy and Smart Grids Energy Management Production Control Operations Scheduling

More information

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

Master of Science (Electrical Engineering) MS(EE)

Master of Science (Electrical Engineering) MS(EE) Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant

More information

Available online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7

Available online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7 Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 38 (2015 ) 3 7 The Fourth International Conference on Through-life Engineering Services Industrial big data analytics and cyber-physical

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

The Industrial Revolution Meets The Internet Revolution. 17 April 2015

The Industrial Revolution Meets The Internet Revolution. 17 April 2015 The Industrial Revolution Meets The Internet Revolution 17 April 2015 A fundamental new rule for business is that the Internet changes everything. -Bill Gates, 1999 Or has it? April 20, 2015 2 Where We

More information

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting

More information

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group PReynolds@ARCweb.com Twitter @PeterDReynolds The Hardware Layer

More information

Manufacturing intelligence

Manufacturing intelligence Manufacturing intelligence Martin Helgoson, Senior project leader Intelligent Machining Vahid Kalhori, Manager Intelligent Machining Jan Edvardsson, Market Analyst Product Management WHITE PAPER We re

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

ETERNUS CS High End Unified Data Protection

ETERNUS CS High End Unified Data Protection ETERNUS CS High End Unified Data Protection Optimized Backup and Archiving with ETERNUS CS High End 0 Data Protection Issues addressed by ETERNUS CS HE 60% of data growth p.a. Rising back-up windows Too

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic

More information

Internet of Things. Chancen der Digitalen Revolution für die deutsche Industrie. Frank Riemensperger. Vorsitzender der Geschäftsführung Deutschland

Internet of Things. Chancen der Digitalen Revolution für die deutsche Industrie. Frank Riemensperger. Vorsitzender der Geschäftsführung Deutschland Chancen der Digitalen Revolution für die deutsche Industrie Vorsitzender der Geschäftsführung Deutschland Definition von Smart Services Produkte, Prozesse und Dienstleistungen werden digital veredelt und

More information

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens (Frank.Piessens@cs.kuleuven.be ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

Evolving from SCADA to IoT

Evolving from SCADA to IoT Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.

More information

The Internet of Things

The Internet of Things The Internet of Things Powe re d by IPv6 Jeff Apcar Distinguished Services Engineer, Cisco Systems March 14 th 2014, ida IPv6 Conference IoT Definition ** A collection of things Cisco Confidential 2 IoE/IoT/M2M

More information

Vorlesung Kommunikationsnetze Fieldbus Systems

Vorlesung Kommunikationsnetze Fieldbus Systems Vorlesung Kommunikationsnetze Fieldbus Systems Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Master of Science Service Oriented Architecture for Enterprise. Courses description

Master of Science Service Oriented Architecture for Enterprise. Courses description Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,

More information

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect

More information