{"title":"工业4.0的网络安全保障:IIoT威胁和攻击场景中的ENISA文件","authors":"Vladimir V. Sklyar, V. Kharchenko","doi":"10.1109/IDAACS.2019.8924452","DOIUrl":null,"url":null,"abstract":"The paper is devoted to analysis of a set of the European Union Agency for Network and Information Security (ENISA) documents in area of IoT security. Industrial IoT (IIoT) characteristics are studied for differences between IIoT and IoT, IIoT asset taxonomy and IIoT security challenges. After that ENISA IoT/IIoT Security Framework has been formed on the base of semantic details of the six studied ENISA documents. Additional attention is paid to IIoT treats taxonomy and attacks scenarios.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios\",\"authors\":\"Vladimir V. Sklyar, V. Kharchenko\",\"doi\":\"10.1109/IDAACS.2019.8924452\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper is devoted to analysis of a set of the European Union Agency for Network and Information Security (ENISA) documents in area of IoT security. Industrial IoT (IIoT) characteristics are studied for differences between IIoT and IoT, IIoT asset taxonomy and IIoT security challenges. After that ENISA IoT/IIoT Security Framework has been formed on the base of semantic details of the six studied ENISA documents. Additional attention is paid to IIoT treats taxonomy and attacks scenarios.\",\"PeriodicalId\":415006,\"journal\":{\"name\":\"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IDAACS.2019.8924452\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDAACS.2019.8924452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios
The paper is devoted to analysis of a set of the European Union Agency for Network and Information Security (ENISA) documents in area of IoT security. Industrial IoT (IIoT) characteristics are studied for differences between IIoT and IoT, IIoT asset taxonomy and IIoT security challenges. After that ENISA IoT/IIoT Security Framework has been formed on the base of semantic details of the six studied ENISA documents. Additional attention is paid to IIoT treats taxonomy and attacks scenarios.