HORIZONTE DE LA SEGURIDAD INFORMÁTICA EN LA ERA DE LA INDUSTRIA 4.0

J. Franco
{"title":"HORIZONTE DE LA SEGURIDAD INFORMÁTICA EN LA ERA DE LA INDUSTRIA 4.0","authors":"J. Franco","doi":"10.21017/RIMCI.2020.V7.N14.A84","DOIUrl":null,"url":null,"abstract":"Today’s humanity thanks to the third industrial revolution, has relied on technology as a mechanism of evolution towards a new digital way of life, where today smart computing devices are becoming more common and therefore it started to permeate more easily on different areas of our society, and together with the help of an amazing telecommunications medium as massive and dynamic just as the contemporary Internet, has allowed to view a new industrialized model for the manufacture of industrialized products in an automatic and autonomous way; this concept is called the fourth industrial revolution or industry 4.0, where the interconnectivity based on the Internet of things and the intelligent and robotic technological elements, deploy a new and refreshing industrial model.This new industrial revolution as well as any technological revolutionary trend with high impact for humanity, always are accompanied by an urgent need to be evaluated and safeguarded with the parameters of today’s computer security, which may be limited or insufficient for the ideology of the industry 4.0, this is because the existing IT security activities are insufficient for such massive, distributed, insecure and critical environment as the proposed by the next generation production plants and therefore at the same time the companies must evolve to adopt the native production processes of the fourth industrial revolution, the computer security specialists must also develop their concepts, technologies and activities, to design and manage highly secure production environments aligned with the requirements and vulnerabilities of this new industrial generation.The ultimate purpose of this document is to present how current IT security should begin to see the industry 4.0 as its new field of action, because without a robust technological protection model any deployment of new generation industrial functions it would be completely catastrophic for the company that wishes to evolve thanks to the adoption of this new business archetype. This article is segmented by the presentation of a context by the principles of the fourth industrial revolution, where some key foundations of this technological trend are exhibited, and then go on to exhibit a safety analysis on the different segments that make up a factory of new generation, to then identify some of the most interesting trends of attack that modern cybercriminals are beginning to deploy to violate complex industrial systems, and finally present some safety recommendations based on the study of the native vulnerabilities of a generic factory 4.0 along with the newest styles of digital aggression focused on this amazing but defenseless new generation industrial guideline. \nDOI: http://dx.doi.org/10.21017/rimci.2020.v7.n14.a84","PeriodicalId":267527,"journal":{"name":"Revista Ingeniería, Matemáticas y Ciencias de la Información","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista Ingeniería, Matemáticas y Ciencias de la Información","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21017/RIMCI.2020.V7.N14.A84","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Today’s humanity thanks to the third industrial revolution, has relied on technology as a mechanism of evolution towards a new digital way of life, where today smart computing devices are becoming more common and therefore it started to permeate more easily on different areas of our society, and together with the help of an amazing telecommunications medium as massive and dynamic just as the contemporary Internet, has allowed to view a new industrialized model for the manufacture of industrialized products in an automatic and autonomous way; this concept is called the fourth industrial revolution or industry 4.0, where the interconnectivity based on the Internet of things and the intelligent and robotic technological elements, deploy a new and refreshing industrial model.This new industrial revolution as well as any technological revolutionary trend with high impact for humanity, always are accompanied by an urgent need to be evaluated and safeguarded with the parameters of today’s computer security, which may be limited or insufficient for the ideology of the industry 4.0, this is because the existing IT security activities are insufficient for such massive, distributed, insecure and critical environment as the proposed by the next generation production plants and therefore at the same time the companies must evolve to adopt the native production processes of the fourth industrial revolution, the computer security specialists must also develop their concepts, technologies and activities, to design and manage highly secure production environments aligned with the requirements and vulnerabilities of this new industrial generation.The ultimate purpose of this document is to present how current IT security should begin to see the industry 4.0 as its new field of action, because without a robust technological protection model any deployment of new generation industrial functions it would be completely catastrophic for the company that wishes to evolve thanks to the adoption of this new business archetype. This article is segmented by the presentation of a context by the principles of the fourth industrial revolution, where some key foundations of this technological trend are exhibited, and then go on to exhibit a safety analysis on the different segments that make up a factory of new generation, to then identify some of the most interesting trends of attack that modern cybercriminals are beginning to deploy to violate complex industrial systems, and finally present some safety recommendations based on the study of the native vulnerabilities of a generic factory 4.0 along with the newest styles of digital aggression focused on this amazing but defenseless new generation industrial guideline. DOI: http://dx.doi.org/10.21017/rimci.2020.v7.n14.a84
工业4.0时代的计算机安全视野
由于第三次工业革命,今天的人类依靠技术作为一种向新的数字生活方式进化的机制,今天智能计算设备变得越来越普遍,因此它开始更容易渗透到我们社会的不同领域,再加上一个惊人的电信媒介的帮助,就像当代互联网一样庞大和动态,允许以自动和自主的方式看待工业化产品制造的新工业化模式;这一概念被称为第四次工业革命或工业4.0,其中基于物联网和智能和机器人技术元素的互联互通部署了一个全新的、令人耳目一新的工业模式。这种新的工业革命以及任何对人类产生重大影响的技术革命趋势,总是伴随着迫切需要用当今计算机安全的参数来评估和维护,这对于工业4.0的意识形态来说可能是有限的或不足的,这是因为现有的IT安全活动不足以应对这种大规模的,分布式的,下一代生产工厂提出的不安全和关键环境,因此与此同时,公司必须发展采用第四次工业革命的本地生产过程,计算机安全专家也必须发展他们的概念、技术和活动,以设计和管理与新工业一代的要求和漏洞相一致的高度安全的生产环境。本文的最终目的是介绍当前IT安全应如何开始将工业4.0视为其新的行动领域,因为如果没有强大的技术保护模型,任何新一代工业功能的部署对于希望通过采用这种新业务原型而发展的公司来说都将是完全灾难性的。本文通过第四次工业革命原则的背景介绍进行分段,其中展示了这种技术趋势的一些关键基础,然后继续展示构成新一代工厂的不同部分的安全分析,然后确定一些最有趣的攻击趋势,现代网络犯罪分子开始部署以侵犯复杂的工业系统。最后提出了一些安全建议,基于对通用工厂4.0的原生漏洞的研究,以及针对这一惊人但毫无防御能力的新一代工业准则的最新数字攻击风格。DOI: http://dx.doi.org/10.21017/rimci.2020.v7.n14.a84
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信