Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
|
|
|
- Piers Joseph
- 10 years ago
- Views:
Transcription
1 Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2 D Darmstadt [email protected] Tel: June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 1
2 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 2
3 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 3
4 Fachgebiet Datenverarbeitung in der Konstruktion (DiK) Computer Integrated Design Overview: Computer Integrated Design Head: Prof. Dr.-Ing. R. Anderl 20 Research Assistants 5 Technical and Administrative Staff, ~ 50 Teaching Assistents International Competence and Experience in the Fields of: Virtual Product Development using Smart Engineering, Product Lifecycle Management Process Integration / Optimization Industrie 4.0 June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 4
5 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 5
6 Industrie 4.0 First Programmable Logic Controller (PLC) Modicon Industrial Revolution based on Cyber-Physical Systems 4th Industrial Revolution First mechanical loom 1784 First assembly line Union Stock Yards Industrial Revolution by introduction of shared mass-prodution with help of electric energy 3. Industrial Revolution by electronics and IT for enhanced automization in production 3rd Industrial Revolution 2nd Industrial Revolution Level of Complexity 1. Industrial Revolution by introduction of manufacturing plants with help of hydro power and steam power 1st Industrial Revolution End of Beginning of Beginning of the Today time 18th Century 20th Century 1970s Source: Kagermann, H.; Wahlster, W.; Held, J.; (Hrsg.) : Bericht der Promotorengruppe Kommunikation. Im Fokus: Das Zukunftsprojekt Industrie 4.0. Forschungsunion, 2012 June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 6
7 The Vision of Industrie 4.0 Recommendations for implementing Industrie 4.0 Establish value-added networks June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 7
8 Use Cases for Smart Applications communicating and self-controlling systems monitoring functional integration cyber-physical systems June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 8
9 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 9
10 Cyber Physical Systems Cyber Physical Systems are resulting from two views: cyberizing the physical for specifying physical subsystems with computational abstractions and interfaces and physicalizing the cyber for expressing abstractions and interfaces of software and network components to represent physical systems dynamics in time [LEE2010] June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 10
11 Industrie 4.0: Cyber-Physical Systems Embedded Systems enabling CPS and CPPS Smart Sensors Smart Systems (Smart Sensors and Actuators) Cyber Physical Systems (CPS) Cyber Physical Production Systems (CPPS) Embedded System June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 11
12 Industrie 4.0: Internet technologies Internet of Things, Services and Data Internet of Things (IoT) Communicating objects based on internet technologies Detection and identification using IPv6-addresses (128 bit address space) Advantages: Detection, identification and location of physical objects Communication through connectivity Every physical object might be equipped with an IPv6-address Internet of Sevices (IoS) New approach to provide internet based services Concepts for product specific services on demand, knowledge provision and services for controlling product behaviour Interaction between people, machines and systems to improve added value Internet of Data (IoD) Service based added value processes Data is managed and shared using internet technologies Cyber-physical systems are producing big data Fundamental prerequisite: Development of a holistic security and safety culture establish sustainable trusted environments Smart Logistics Manage big data: integrate product and production data June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 12 Smart Production Procecces Smart Engineering
13 Don t forget Industrie 4.0 People! Human centric environments Continuous learning and advanced qualification paths from professional qualification to academic qualification Networks of good pratice Knowledge and competence building on the job Job enrichment Interdisciplinary awareness, thinking and understanding Agile skills (delta engineering to adapt appropriate skills) June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 13
14 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 14
15 Holistic Approach for Security and Safety Application Layer Safe and secure Industrie 4.0-processes System Layer Safe and secure cyber-physical systems Safe and secure things Reliable and robust machine control Authentification Attestation Integrity Safe and secure Data Encryption Signed data Unforgeability Safe and secure Sevices Usage policy enforcement Trusted providers and owners Trusted environments User identity Technology Layer June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 15
16 Synchronous and Asynchronous Operation smart sensor sensors real time synchronous operation Established IT-security methods asynchronous operation internet of Data internet of Services smart actuator Control units continuous processes discrete processes G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y data exchange cryptography actuators Heute: Trennung von Sicherheits- und Echtzeitwelt future systems require IT safety and security closely tied to physical processes June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 16
17 Industrie 4.0: Security CPS layer model Knowledge theft Social engineering Phishing Staff training for knowledge protection and IT security competence Protocol analyzer DDoS Network intrusion Man in the Middle Unencrypted streams Firewalls Network-Intrusion Detection Encrypt data transmissions Side-channel attacks Hardware protection IT-Security Evaluation Common Criteria (EAL-CC) Logic analysis Signal recording Active components tampering Malware protection Antivirus software Malware Trojans, Worms Decompiling Malcode injection Memory editing Sandboxing, Memory integrity checks Disassembling Reverse Engineering Encryption of program resources Obfuscation, masking Integrity and plausability checks for active components June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 17
18 Use Case Additive Manufacturing June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 18
19 Industrie 4.0 Internet based Services Cyber-Physical Production Systems (CPPS) June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 19
20 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 20
21 Platform Industrie Quelle: Plattform Industrie 4.0 ( June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 21
22 Scientific Advisory Board: 17 Assumptions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 22
23 Research Roadmap of the Platform Industrie Horizontal integration via value creation networks Seamless engineering throughout life cycle MIGRATION STRATEGY Methods for new business models Automation of value creation networks Integration of real and virtual worlds Systems Engineering Methods for framework Value creation networks INDUSTRY 4.0 by DESIGN Vertical integration and networked production systems Sensor data analysis and derivation of data-based process control system Intelligence - Flexibility - Adaptability New social infrastructures for work Multimodal assistant systems Acceptance of technology and nature of work Continuous development of hybrid technologies Wireless communication for Industry 4.0 scenarios Security & safety Industry 4.0 platform with reference architectures and decentralized service-oriented architecture June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 23
24 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 24
25 Conclusions Smart Products and Smart Factories are key targets of the German national strategy Industrie 4.0 Key strategy of Industrie 4.0 is the creation of new innovation for smart products and smart production systems based on the integration of internet based communication and embedded control software Safety and security is a fundamental concern to be solved and has to be an integral part of each and every development approach for smart products and smart production systems as well Future research activities will also need to address - knowledge protection, - new business models as well as - human factors for Industrie 4.0. June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 25
26 Source: Potthast Fachschaftenkonferenz June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 26
What is Industrie 4.0
What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2
What is Industrie 4.0 and how will it create the new growth?
What is Industrie 4.0 and how will it create the new growth? Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität
IoT in Production. Dr. Verena Majuntke, Bosch Software Innovations. Bosch Software Innovations
IoT in Production Dr. Verena Majuntke, 1 Public INST/MKC 07.2014 GmbH 2014. All rights reserved, also regarding any disposal, Agenda The Internet of Things Internet of Things in Production Business Ecosystem
A Modern Process Automation System Offers More than Process Control. Dick Hill Vice President ARC Advisory Group [email protected]
A Modern Process Automation System Offers More than Process Control Dick Hill Vice President ARC Advisory Group [email protected] Modern Business Requirements Dynamic Customer Requirements Requiring Agility
SAP Industry 4.0 & the Internet of Things Connected Manufacturing in Mill Products Industries. Chris Dorrow, May 2015
SAP Industry 4.0 & the Internet of Things Connected Manufacturing in Mill Products Industries Chris Dorrow, May 2015 Trends in an Industrial World Connected Devices Connected Processes Connected Business
Industry 4.0 Vision to Reality Siemens AG 2015 siemens.com
Alan Norbury Siemens UK Industrial CTO Industry 4.0 Vision to Reality siemens.com Future of Manufacturing - Video http://www.siemens.co.uk/future-of-manufacturing Page 2 Industry 4.0.moving into a fourth
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes
Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Johannes Schöning Munich, Germany 10/2013 London Münster Berlin Köln Hasselt Saarbrücken Innovative Retail Lab (IRL)
The Internet of Things and the future of manufacturing
JUNE 2013 Josh Cochran b u s i n e s s t e c h n o l o g y o f f i c e The Internet of Things and the future of manufacturing Executives at Robert Bosch and McKinsey experts discuss the technology-driven
Industrie 4.0 The path from research to practice Unrestricted Siemens AG 2013. All rights reserved
Dr. Wolfgang Heuring, Head of Research and Technology Center Industrie 4.0 The path from research to practice Unrestricted Siemens AG 2013. All rights reserved Siemens is the driver of innovation in Automation
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda
Enterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
Adapting to Change in the 4th Industrial Revolution. Graham Conlon Global Vice President, Extended Supply Chain, SAP
Adapting to Change in the 4th Industrial Revolution Graham Conlon Global Vice President, Extended Supply Chain, SAP Business Strategies Translating Business Realities to Business Strategies Personalized
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
IO-Link an integral part in the next industrial revolution known as Industry 4.0
IO-Link an integral part in the next industrial revolution known as Industry 4.0 IO-Link an integral part in the next industrial revolution known as Industry 4.0 The manufacturing industry is on the verge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Industry 4.0 Challenges and Opportunities
Industry 4.0 Challenges and Opportunities Institute of Industrial Management and Innovation Research Graz University of Technology 14 th International Conference on Knowledge Technologies and Data-driven
Industry 4.0 the German vision for advanced manufacturing
www.smartfactory-kl.de Industry 4.0 the German vision for advanced manufacturing Prof. Dr. Dr. h.c. Detlef Zühlke Director Innovative Factory Systems IFS German Research Center for Artificial Intelligence,
Industrie 4.0 Engineering of IoT Applications for Indus trial Production
Industrie 4.0 Engineering of IoT Applications for Indus trial Production Internet of Things e Big Data Summit Milano, 11 June 2015 Dr.-Ing. Thomas Usländer Fraunhofer IOSB, Germany Josef von Fraunhofer
Integration of Industry 4.0 in Education Programs of German Universities of Applied Science. Prof. Dr.-Ing. Rainer Würslin
Integration of Industry 4.0 in Education Programs of German Universities of Applied Science Prof. Dr.-Ing. Rainer Würslin Agenda» The University of Applied Sciences Esslingen» The German Education- and
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
CYBER PHYSICAL SYSTEMS@FRAUNHOFER IIS
F R A U N H O F E R I N S T I T U T E F O R I N T E G R AT E D C I R C U I T S I I S CYBER PHYSICAL SYSTEMS@FRAUNHOFER IIS CPS@FRAUNHOFER IIS Cyber physical systems: it is no longer possible to separate
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science
2015-06-23 Susanne Timsjö at ABB Corporate Research The 4 th Industrial Revolution Internet of Things, Services and People
2015-06-23 Susanne Timsjö at ABB Corporate Research The 4 th Industrial Revolution Internet of Things, Services and People June 30, 2015 Slide 1 User in focus! June 30, 2015 Slide 2 Next industrial revolution
Factories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation
Factories of the Future Horizon 2020: LEIT ICT WP2016-17 FoF-11-2016: Digital Automation Directorate General for Communication Networks, Content and Technology FoF PPP in Work Programme 2016-2017 FoF-11-2016:
ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things
ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group [email protected] Session Overview ARC Presentation
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
Shaping the Future of Production with Siemens: On the way to Industry 4.0
Shaping the Future of with Siemens: On the way to Industry 4.0 Member of the Managing Board of Siemens AG CEO Industry Sector Press Conference Hannover Messe 2013 April 8, 2013 Manufacturing is changing
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER Understanding what a PAC is starts from the understanding of PLC. A PLC is a Programmable Logic while
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems
Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems Summary of Main Findings of the Manufuture 13 Stamatis Karnouskos Input from Manufuture 2013 Session Presentations: Rolf
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Factories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation
Factories of the Future Horizon 2020: LEIT ICT WP2016-17 FoF-11-2016: Digital Automation FoF PPP in Work Programme 2016-2017 FoF-11-2016: Digital automation FoF-12-2017: ICT Innovation for Manufacturing
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Exploitation of Cyber-Physical Systems and Ambient Intelligence An Intel Business Perspective
Exploitation of Cyber-Physical Systems and Ambient Intelligence An Intel Business Perspective Acatech: Integrated Research Agenda Cyber-Physical Systems April 12, 2012, EIT ICT Labs, Berlin Prof. Martin
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Securely Connect, Network, Access, and Visualize Your Data
Securely Connect, Network, Access, and Visualize Your Data 1 Who is Skkynet? Skkynet is the Parent company of; - Cogent Real-Time Systems Established in 1994 Focus on Industrial Automation software Cogent
Industrie 4.0. The Aachen Approach
Industrie 4.0 The Aachen Approach Axel Demmer Fraunhofer Institute for Production Technology IPT, Aachen (GER) Fraunhofer Additive Manufacturing Alliance Paradigm shifts lead to the announced fourth industrial
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
M2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo
M2M The Next Industrial Revolution & Energy Transition Driver M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo MarComSo Short Profile Founded in 1997 Focus on M2M/IoT-, IT
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
Collaboration Accelerates the Internet of Things and Industry 4.0
Case Study BECKHOFF Collaboration Accelerates the Internet of Things and Industry 4.0 Driving Innovation in the Factory by Consolidating Systems with PC-Based Control Technology The number of connected
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Industrie 4.0 What can the UK learn from Germany s manufacturing strategy? 4 February 2014
Industrie 4.0 What can the UK learn from Germany s manufacturing strategy? 4 February 2014 @RAEngNews #Eng4Growth How Industrie 4.0 Will Coin the Economy of the Future. The Results of the German High-Tech
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
Secure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...
Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet
ENABLING RELIABLE COMMUNICATION FOR EMERGING M2M/IOT APPLICATIONS
ENABLING RELIABLE COMMUNICATION FOR EMERGING M2M/IOT APPLICATIONS Matthias Heyde / Fraunhofer FOKUS Dr.-Ing. Adel Al-Hezmi, Fraunhofer FOKUS M2M Summit 8. 9. Sep 2015, Düsseldorf AGENDA 1. Motivations
How To Get A Computer Science Degree
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Multi-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids.
Multi-Agent Systems Event Expert Forum Agents within the context of Industry 4.0 Industry 4.0 Machine Learning Material Handling Energy and Smart Grids Energy Management Production Control Operations Scheduling
Center of Academic Excellence Cyber Operations Program 2013 Application
Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department
Master of Science (Electrical Engineering) MS(EE)
Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant
Available online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7
Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 38 (2015 ) 3 7 The Fourth International Conference on Through-life Engineering Services Industrial big data analytics and cyber-physical
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group [email protected]
Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group [email protected] Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group [email protected] Twitter @PeterDReynolds The Hardware Layer
Manufacturing intelligence
Manufacturing intelligence Martin Helgoson, Senior project leader Intelligent Machining Vahid Kalhori, Manager Intelligent Machining Jan Edvardsson, Market Analyst Product Management WHITE PAPER We re
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
ETERNUS CS High End Unified Data Protection
ETERNUS CS High End Unified Data Protection Optimized Backup and Archiving with ETERNUS CS High End 0 Data Protection Issues addressed by ETERNUS CS HE 60% of data growth p.a. Rising back-up windows Too
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
Internet of Things. Chancen der Digitalen Revolution für die deutsche Industrie. Frank Riemensperger. Vorsitzender der Geschäftsführung Deutschland
Chancen der Digitalen Revolution für die deutsche Industrie Vorsitzender der Geschäftsführung Deutschland Definition von Smart Services Produkte, Prozesse und Dienstleistungen werden digital veredelt und
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Evolving from SCADA to IoT
Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.
The Internet of Things
The Internet of Things Powe re d by IPv6 Jeff Apcar Distinguished Services Engineer, Cisco Systems March 14 th 2014, ida IPv6 Conference IoT Definition ** A collection of things Cisco Confidential 2 IoE/IoT/M2M
Vorlesung Kommunikationsnetze Fieldbus Systems
Vorlesung Kommunikationsnetze Fieldbus Systems Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
Master of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat
Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect
