{"title":"ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios","authors":"Vladimir V. Sklyar, V. Kharchenko","doi":"10.1109/IDAACS.2019.8924452","DOIUrl":null,"url":null,"abstract":"The paper is devoted to analysis of a set of the European Union Agency for Network and Information Security (ENISA) documents in area of IoT security. Industrial IoT (IIoT) characteristics are studied for differences between IIoT and IoT, IIoT asset taxonomy and IIoT security challenges. After that ENISA IoT/IIoT Security Framework has been formed on the base of semantic details of the six studied ENISA documents. Additional attention is paid to IIoT treats taxonomy and attacks scenarios.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDAACS.2019.8924452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
The paper is devoted to analysis of a set of the European Union Agency for Network and Information Security (ENISA) documents in area of IoT security. Industrial IoT (IIoT) characteristics are studied for differences between IIoT and IoT, IIoT asset taxonomy and IIoT security challenges. After that ENISA IoT/IIoT Security Framework has been formed on the base of semantic details of the six studied ENISA documents. Additional attention is paid to IIoT treats taxonomy and attacks scenarios.