{"title":"The Context of Security Within the Fourth Industrial Revolution","authors":"A. Caldwell","doi":"10.20533/ijicss.9781.9083.20346.2022.0013","DOIUrl":null,"url":null,"abstract":"The fourth industrial revolution is characterized by cyber-physical systems, where technology becomes more embedded within society. Within this context, the risk associated with trust in this digital transformation is a critical relationship. The prevalence of cyber-attacks which have disrupted critical infrastructures have led to the emerging perception that active defenses are becoming appropriate. Security by design is increasingly leveraged into the early phases of product development right up to product release. Enhancing the understanding of cybersecurity in digital transformation, the red team/blue team exercise as well as a consideration of the Internet of Things (IoT) are outlined.","PeriodicalId":219252,"journal":{"name":"International Journal of Industrial Control Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Industrial Control Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20533/ijicss.9781.9083.20346.2022.0013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The fourth industrial revolution is characterized by cyber-physical systems, where technology becomes more embedded within society. Within this context, the risk associated with trust in this digital transformation is a critical relationship. The prevalence of cyber-attacks which have disrupted critical infrastructures have led to the emerging perception that active defenses are becoming appropriate. Security by design is increasingly leveraged into the early phases of product development right up to product release. Enhancing the understanding of cybersecurity in digital transformation, the red team/blue team exercise as well as a consideration of the Internet of Things (IoT) are outlined.