Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
|
|
- Piers Joseph
- 8 years ago
- Views:
Transcription
1 Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2 D Darmstadt anderl@dik.tu-darmstadt.de Tel: June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 1
2 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 2
3 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 3
4 Fachgebiet Datenverarbeitung in der Konstruktion (DiK) Computer Integrated Design Overview: Computer Integrated Design Head: Prof. Dr.-Ing. R. Anderl 20 Research Assistants 5 Technical and Administrative Staff, ~ 50 Teaching Assistents International Competence and Experience in the Fields of: Virtual Product Development using Smart Engineering, Product Lifecycle Management Process Integration / Optimization Industrie 4.0 June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 4
5 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 5
6 Industrie 4.0 First Programmable Logic Controller (PLC) Modicon Industrial Revolution based on Cyber-Physical Systems 4th Industrial Revolution First mechanical loom 1784 First assembly line Union Stock Yards Industrial Revolution by introduction of shared mass-prodution with help of electric energy 3. Industrial Revolution by electronics and IT for enhanced automization in production 3rd Industrial Revolution 2nd Industrial Revolution Level of Complexity 1. Industrial Revolution by introduction of manufacturing plants with help of hydro power and steam power 1st Industrial Revolution End of Beginning of Beginning of the Today time 18th Century 20th Century 1970s Source: Kagermann, H.; Wahlster, W.; Held, J.; (Hrsg.) : Bericht der Promotorengruppe Kommunikation. Im Fokus: Das Zukunftsprojekt Industrie 4.0. Forschungsunion, 2012 June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 6
7 The Vision of Industrie 4.0 Recommendations for implementing Industrie 4.0 Establish value-added networks June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 7
8 Use Cases for Smart Applications communicating and self-controlling systems monitoring functional integration cyber-physical systems June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 8
9 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 9
10 Cyber Physical Systems Cyber Physical Systems are resulting from two views: cyberizing the physical for specifying physical subsystems with computational abstractions and interfaces and physicalizing the cyber for expressing abstractions and interfaces of software and network components to represent physical systems dynamics in time [LEE2010] June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 10
11 Industrie 4.0: Cyber-Physical Systems Embedded Systems enabling CPS and CPPS Smart Sensors Smart Systems (Smart Sensors and Actuators) Cyber Physical Systems (CPS) Cyber Physical Production Systems (CPPS) Embedded System June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 11
12 Industrie 4.0: Internet technologies Internet of Things, Services and Data Internet of Things (IoT) Communicating objects based on internet technologies Detection and identification using IPv6-addresses (128 bit address space) Advantages: Detection, identification and location of physical objects Communication through connectivity Every physical object might be equipped with an IPv6-address Internet of Sevices (IoS) New approach to provide internet based services Concepts for product specific services on demand, knowledge provision and services for controlling product behaviour Interaction between people, machines and systems to improve added value Internet of Data (IoD) Service based added value processes Data is managed and shared using internet technologies Cyber-physical systems are producing big data Fundamental prerequisite: Development of a holistic security and safety culture establish sustainable trusted environments Smart Logistics Manage big data: integrate product and production data June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 12 Smart Production Procecces Smart Engineering
13 Don t forget Industrie 4.0 People! Human centric environments Continuous learning and advanced qualification paths from professional qualification to academic qualification Networks of good pratice Knowledge and competence building on the job Job enrichment Interdisciplinary awareness, thinking and understanding Agile skills (delta engineering to adapt appropriate skills) June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 13
14 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 14
15 Holistic Approach for Security and Safety Application Layer Safe and secure Industrie 4.0-processes System Layer Safe and secure cyber-physical systems Safe and secure things Reliable and robust machine control Authentification Attestation Integrity Safe and secure Data Encryption Signed data Unforgeability Safe and secure Sevices Usage policy enforcement Trusted providers and owners Trusted environments User identity Technology Layer June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 15
16 Synchronous and Asynchronous Operation smart sensor sensors real time synchronous operation Established IT-security methods asynchronous operation internet of Data internet of Services smart actuator Control units continuous processes discrete processes G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y G1 X Y data exchange cryptography actuators Heute: Trennung von Sicherheits- und Echtzeitwelt future systems require IT safety and security closely tied to physical processes June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 16
17 Industrie 4.0: Security CPS layer model Knowledge theft Social engineering Phishing Staff training for knowledge protection and IT security competence Protocol analyzer DDoS Network intrusion Man in the Middle Unencrypted streams Firewalls Network-Intrusion Detection Encrypt data transmissions Side-channel attacks Hardware protection IT-Security Evaluation Common Criteria (EAL-CC) Logic analysis Signal recording Active components tampering Malware protection Antivirus software Malware Trojans, Worms Decompiling Malcode injection Memory editing Sandboxing, Memory integrity checks Disassembling Reverse Engineering Encryption of program resources Obfuscation, masking Integrity and plausability checks for active components June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 17
18 Use Case Additive Manufacturing June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 18
19 Industrie 4.0 Internet based Services Cyber-Physical Production Systems (CPPS) June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 19
20 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 20
21 Platform Industrie Quelle: Plattform Industrie 4.0 ( June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 21
22 Scientific Advisory Board: 17 Assumptions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 22
23 Research Roadmap of the Platform Industrie Horizontal integration via value creation networks Seamless engineering throughout life cycle MIGRATION STRATEGY Methods for new business models Automation of value creation networks Integration of real and virtual worlds Systems Engineering Methods for framework Value creation networks INDUSTRY 4.0 by DESIGN Vertical integration and networked production systems Sensor data analysis and derivation of data-based process control system Intelligence - Flexibility - Adaptability New social infrastructures for work Multimodal assistant systems Acceptance of technology and nature of work Continuous development of hybrid technologies Wireless communication for Industry 4.0 scenarios Security & safety Industry 4.0 platform with reference architectures and decentralized service-oriented architecture June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 23
24 Overview Industrie Introduction 2. The Vision of Industrie Cyber Physical Systems and Internet 4. Holistic Approach for Cyber Safety and Security 5. Strategic Remarks 6. Conclusions June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 24
25 Conclusions Smart Products and Smart Factories are key targets of the German national strategy Industrie 4.0 Key strategy of Industrie 4.0 is the creation of new innovation for smart products and smart production systems based on the integration of internet based communication and embedded control software Safety and security is a fundamental concern to be solved and has to be an integral part of each and every development approach for smart products and smart production systems as well Future research activities will also need to address - knowledge protection, - new business models as well as - human factors for Industrie 4.0. June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 25
26 Source: Potthast Fachschaftenkonferenz June 10, 2014 Faculty of Mechanical Engineering Department of Computer Integrated Design Prof. Dr.-Ing. R. Anderl 26
What is Industrie 4.0
What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2
More informationWhat is Industrie 4.0 and how will it create the new growth?
What is Industrie 4.0 and how will it create the new growth? Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität
More informationIoT in Production. Dr. Verena Majuntke, Bosch Software Innovations. Bosch Software Innovations
IoT in Production Dr. Verena Majuntke, 1 Public INST/MKC 07.2014 GmbH 2014. All rights reserved, also regarding any disposal, Agenda The Internet of Things Internet of Things in Production Business Ecosystem
More informationA Modern Process Automation System Offers More than Process Control. Dick Hill Vice President ARC Advisory Group dhill@arcweb.com
A Modern Process Automation System Offers More than Process Control Dick Hill Vice President ARC Advisory Group dhill@arcweb.com Modern Business Requirements Dynamic Customer Requirements Requiring Agility
More informationSAP Industry 4.0 & the Internet of Things Connected Manufacturing in Mill Products Industries. Chris Dorrow, May 2015
SAP Industry 4.0 & the Internet of Things Connected Manufacturing in Mill Products Industries Chris Dorrow, May 2015 Trends in an Industrial World Connected Devices Connected Processes Connected Business
More informationVerfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014
Verfahren zur Absicherung von Apps Dr. Ullrich Martini IHK, 4-12-2014 Agenda Introducing G&D Problem Statement Available Security Technologies Smartcard Embedded Secure Element Virtualization Trusted Execution
More informationIndustry 4.0 Vision to Reality Siemens AG 2015 siemens.com
Alan Norbury Siemens UK Industrial CTO Industry 4.0 Vision to Reality siemens.com Future of Manufacturing - Video http://www.siemens.co.uk/future-of-manufacturing Page 2 Industry 4.0.moving into a fourth
More informationCHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution
More informationCyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes
Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Johannes Schöning Munich, Germany 10/2013 London Münster Berlin Köln Hasselt Saarbrücken Innovative Retail Lab (IRL)
More informationThe Internet of Things and the future of manufacturing
JUNE 2013 Josh Cochran b u s i n e s s t e c h n o l o g y o f f i c e The Internet of Things and the future of manufacturing Executives at Robert Bosch and McKinsey experts discuss the technology-driven
More informationIndustrie 4.0 The path from research to practice Unrestricted Siemens AG 2013. All rights reserved
Dr. Wolfgang Heuring, Head of Research and Technology Center Industrie 4.0 The path from research to practice Unrestricted Siemens AG 2013. All rights reserved Siemens is the driver of innovation in Automation
More informationERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda
More informationEnterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
More informationAdapting to Change in the 4th Industrial Revolution. Graham Conlon Global Vice President, Extended Supply Chain, SAP
Adapting to Change in the 4th Industrial Revolution Graham Conlon Global Vice President, Extended Supply Chain, SAP Business Strategies Translating Business Realities to Business Strategies Personalized
More informationBYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
More informationIO-Link an integral part in the next industrial revolution known as Industry 4.0
IO-Link an integral part in the next industrial revolution known as Industry 4.0 IO-Link an integral part in the next industrial revolution known as Industry 4.0 The manufacturing industry is on the verge
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationIndustry 4.0 Challenges and Opportunities
Industry 4.0 Challenges and Opportunities Institute of Industrial Management and Innovation Research Graz University of Technology 14 th International Conference on Knowledge Technologies and Data-driven
More informationIndustry 4.0 the German vision for advanced manufacturing
www.smartfactory-kl.de Industry 4.0 the German vision for advanced manufacturing Prof. Dr. Dr. h.c. Detlef Zühlke Director Innovative Factory Systems IFS German Research Center for Artificial Intelligence,
More informationIndustrie 4.0 Engineering of IoT Applications for Indus trial Production
Industrie 4.0 Engineering of IoT Applications for Indus trial Production Internet of Things e Big Data Summit Milano, 11 June 2015 Dr.-Ing. Thomas Usländer Fraunhofer IOSB, Germany Josef von Fraunhofer
More informationIntegration of Industry 4.0 in Education Programs of German Universities of Applied Science. Prof. Dr.-Ing. Rainer Würslin
Integration of Industry 4.0 in Education Programs of German Universities of Applied Science Prof. Dr.-Ing. Rainer Würslin Agenda» The University of Applied Sciences Esslingen» The German Education- and
More informationIndustry 4.0: Realization today with proven control architectures
products PC Control 02 2013 PC-based control the ideal technology platform for the Internet of Things Industry 4.0: Realization today with proven control architectures PC Control 02 2013 products A revolution
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationCertifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
More informationPervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationCYBER PHYSICAL SYSTEMS@FRAUNHOFER IIS
F R A U N H O F E R I N S T I T U T E F O R I N T E G R AT E D C I R C U I T S I I S CYBER PHYSICAL SYSTEMS@FRAUNHOFER IIS CPS@FRAUNHOFER IIS Cyber physical systems: it is no longer possible to separate
More informationNSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science
More information2015-06-23 Susanne Timsjö at ABB Corporate Research The 4 th Industrial Revolution Internet of Things, Services and People
2015-06-23 Susanne Timsjö at ABB Corporate Research The 4 th Industrial Revolution Internet of Things, Services and People June 30, 2015 Slide 1 User in focus! June 30, 2015 Slide 2 Next industrial revolution
More informationFactories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation
Factories of the Future Horizon 2020: LEIT ICT WP2016-17 FoF-11-2016: Digital Automation Directorate General for Communication Networks, Content and Technology FoF PPP in Work Programme 2016-2017 FoF-11-2016:
More informationARC Forum Orlando 2015 Building a Secure Industrial Internet of Things
ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group srsnitkin@arcweb.com Session Overview ARC Presentation
More informationUpdate On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
More informationWhat is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
More informationChallenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
More informationShaping the Future of Production with Siemens: On the way to Industry 4.0
Shaping the Future of with Siemens: On the way to Industry 4.0 Member of the Managing Board of Siemens AG CEO Industry Sector Press Conference Hannover Messe 2013 April 8, 2013 Manufacturing is changing
More informationHorizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
More informationNEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER Understanding what a PAC is starts from the understanding of PLC. A PLC is a Programmable Logic while
More informationWICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
More informationService-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems
Service-Oriented Architecture as an Integrative Backbone for Cyber Physical Systems Summary of Main Findings of the Manufuture 13 Stamatis Karnouskos Input from Manufuture 2013 Session Presentations: Rolf
More informationSecurity Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationFORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
More informationFactories of the Future Horizon 2020: LEIT ICT WP2016-17. FoF-11-2016: Digital Automation
Factories of the Future Horizon 2020: LEIT ICT WP2016-17 FoF-11-2016: Digital Automation FoF PPP in Work Programme 2016-2017 FoF-11-2016: Digital automation FoF-12-2017: ICT Innovation for Manufacturing
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationTRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)
TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,
More informationNSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
More informationSmart Factories and IT Monitoring
Whitepaper Smart Factories and IT Monitoring Is Today s IT Monitoring Smart Enough for a Smart World? Contents Introduction... 3 What will be the role of IT in this new, smart world? 4 What are the next
More informationSECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationNext Generation. VoIP Application Firewall. www.novacybersecurity.com
Next Generation VoIP Application Firewall Are you aware that you are vulnerable to all threats on the Internet? With increasing voice and video transmission over IP and emerging new technologies such as
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationLoophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
More informationTriangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
More informationExploitation of Cyber-Physical Systems and Ambient Intelligence An Intel Business Perspective
Exploitation of Cyber-Physical Systems and Ambient Intelligence An Intel Business Perspective Acatech: Integrated Research Agenda Cyber-Physical Systems April 12, 2012, EIT ICT Labs, Berlin Prof. Martin
More informationThe 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
More informationSecurely Connect, Network, Access, and Visualize Your Data
Securely Connect, Network, Access, and Visualize Your Data 1 Who is Skkynet? Skkynet is the Parent company of; - Cogent Real-Time Systems Established in 1994 Focus on Industrial Automation software Cogent
More informationIndustrie 4.0. The Aachen Approach
Industrie 4.0 The Aachen Approach Axel Demmer Fraunhofer Institute for Production Technology IPT, Aachen (GER) Fraunhofer Additive Manufacturing Alliance Paradigm shifts lead to the announced fourth industrial
More informationCYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
More informationCyber Security and Science
Cyber Security and Science Peter Weinberger pjw@googlecom Feb 9, 2011 These opinions are only mine, no one else s and even then, only today They may change at any time Protecting intellectual property
More informationM2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo
M2M The Next Industrial Revolution & Energy Transition Driver M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo MarComSo Short Profile Founded in 1997 Focus on M2M/IoT-, IT
More informationSDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationCollaboration Accelerates the Internet of Things and Industry 4.0
Case Study BECKHOFF Collaboration Accelerates the Internet of Things and Industry 4.0 Driving Innovation in the Factory by Consolidating Systems with PC-Based Control Technology The number of connected
More informationComputer. Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! master s degree
master s degree Computer Science Welcome to the Faculty of Electrical Engineering, Mathematics and Computer Science! For us the world is flat. Electrical Engineering, Mathematics and Computer Science have
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationSTRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
More informationIndustrie 4.0 What can the UK learn from Germany s manufacturing strategy? 4 February 2014
Industrie 4.0 What can the UK learn from Germany s manufacturing strategy? 4 February 2014 @RAEngNews #Eng4Growth How Industrie 4.0 Will Coin the Economy of the Future. The Results of the German High-Tech
More informationService and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
More informationMobile RFID solutions
A TAKE Solutions White Paper Mobile RFID solutions small smart solutions Introduction Mobile RFID enables unique RFID use-cases not possible with fixed readers. Mobile data collection devices such as scanners
More informationSecure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationSome Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
More informationTowards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...
Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet
More informationENABLING RELIABLE COMMUNICATION FOR EMERGING M2M/IOT APPLICATIONS
ENABLING RELIABLE COMMUNICATION FOR EMERGING M2M/IOT APPLICATIONS Matthias Heyde / Fraunhofer FOKUS Dr.-Ing. Adel Al-Hezmi, Fraunhofer FOKUS M2M Summit 8. 9. Sep 2015, Düsseldorf AGENDA 1. Motivations
More informationHow To Get A Computer Science Degree
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationMulti-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids.
Multi-Agent Systems Event Expert Forum Agents within the context of Industry 4.0 Industry 4.0 Machine Learning Material Handling Energy and Smart Grids Energy Management Production Control Operations Scheduling
More informationCenter of Academic Excellence Cyber Operations Program 2013 Application
Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department
More informationMaster of Science (Electrical Engineering) MS(EE)
Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant
More informationAvailable online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7
Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 38 (2015 ) 3 7 The Fourth International Conference on Through-life Engineering Services Industrial big data analytics and cyber-physical
More informationLifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
More informationThe Industrial Revolution Meets The Internet Revolution. 17 April 2015
The Industrial Revolution Meets The Internet Revolution 17 April 2015 A fundamental new rule for business is that the Internet changes everything. -Bill Gates, 1999 Or has it? April 20, 2015 2 Where We
More informationIndustrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com
Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting
More informationLeveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group PReynolds@ARCweb.com Twitter @PeterDReynolds The Hardware Layer
More informationManufacturing intelligence
Manufacturing intelligence Martin Helgoson, Senior project leader Intelligent Machining Vahid Kalhori, Manager Intelligent Machining Jan Edvardsson, Market Analyst Product Management WHITE PAPER We re
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationETERNUS CS High End Unified Data Protection
ETERNUS CS High End Unified Data Protection Optimized Backup and Archiving with ETERNUS CS High End 0 Data Protection Issues addressed by ETERNUS CS HE 60% of data growth p.a. Rising back-up windows Too
More informationThe Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
More informationThe Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
More informationHow Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
More informationInternet of Things. Chancen der Digitalen Revolution für die deutsche Industrie. Frank Riemensperger. Vorsitzender der Geschäftsführung Deutschland
Chancen der Digitalen Revolution für die deutsche Industrie Vorsitzender der Geschäftsführung Deutschland Definition von Smart Services Produkte, Prozesse und Dienstleistungen werden digital veredelt und
More informationThreat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens (Frank.Piessens@cs.kuleuven.be ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
More informationVerve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
More informationEvolving from SCADA to IoT
Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.
More informationThe Internet of Things
The Internet of Things Powe re d by IPv6 Jeff Apcar Distinguished Services Engineer, Cisco Systems March 14 th 2014, ida IPv6 Conference IoT Definition ** A collection of things Cisco Confidential 2 IoE/IoT/M2M
More informationVorlesung Kommunikationsnetze Fieldbus Systems
Vorlesung Kommunikationsnetze Fieldbus Systems Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationEC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
More informationMaster of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
More informationAddressing the blind spots in your security strategy. BT, Venafi & Blue Coat
Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect
More information