journal article Open Access Mar 25, 2024

Cybersecurity of Industrial Systems—A 2023 Report

Electronics Vol. 13 No. 7 pp. 1191 · MDPI AG
View at Publisher Save 10.3390/electronics13071191
Abstract
The article explores the importance of cybersecurity in Industry 4.0, specifically focusing on safeguarding industrial automation systems from cyberattacks. It discusses essential security measures, network monitoring, and employee training, emphasizing the significance of risk management for ensuring industry stability. Adherence to industrial security standards, such as ISA/IEC 62443, is crucial (ISA—International Society of Automation, IEC—International Electrotechnical Commission). The article outlines cyberthreat challenges and their impact on various sectors, including healthcare and finance, as well as the risks faced by large industrial enterprises. Additionally, it elucidates evolving cybersecurity strategies and principles, underscoring the necessity for continuous, multi-layered protection. Collaboration with operators, strict information security policies, and robust incident response plans are emphasized. The importance of risk monitoring and adaptability to ever-changing threat landscapes is highlighted, emphasizing the collaborative and flexible nature of cybersecurity in the face of escalating digital threats.
Topics

No keywords indexed for this article. Browse by subject →

References
33
[1]
International Society of Automation (2023, November 08). ISA/IEC 62443 Series of Standards. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards.
[2]
Avdibasic "Cybersecurity Challenges in Industry 4.0: A State of the Art Review" Def. Secur. Stud. (2022)
[3]
(2023, November 08). What Is Cybersecurity?, Available online: https://www.cisa.gov/news-events/news/what-cybersecurity.
[4]
Berindei, A.M., Ilie, C., and Florentina, B. (2023). The Cyber Security Paradigm in Industry 4.0. Int. J. Mechatron. Appl. Mech., 226–229.
[5]
(2023, November 08). ENISA Threat Landscape 2022. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022.
[6]
Kumar, G., Singh, O.P., and Saini, H. (2021). Cybersecurity Ambient Technologies, IoT, and Industry 4.0 Implications, CRC Press. 10.1201/9781003145042
[7]
Morgan, D., Gavrilescu, A., Burstein, J.L., Shelest, A., and LeBlanc, D. (2009). Method of Assisting an Application to Traverse a Firewall. (No. 7559082), U.S. Patent.
[8]
(2023, November 08). What Is Operational Security & Why Is It Important?. Available online: https://reciprocity.com/blog/what-is-operational-security-why-is-it-important/.
[9]
TechTarget (2023, November 19). AI (Artificial Intelligence). Available online: https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence.
[10]
Management, M.S.S. (2023, November 19). Machine Learning Explained. Available online: https://mitsloan.mit.edu/ideas-made-to-matter/machine-learning-explained.
[11]
Cunningham, D.C., and Touhill, G.J. (2020). Cyber Warfare-Truth, Tactics, and Strategies, Packt Publishing.
[12]
Aiken, M. (2016). The Cyber Effect, Spiegel & Grau.
[13]
Stanham, L. (2023, November 19). What Is AI-Powered Behavioral Analysis in Cybersecurity. Available online: https://www.crowdstrike.com/cybersecurity-101/secops/ai-powered-behavioral-analysis/.
[14]
Schneier, B. (2008). Schneier on Security, John Wiley & Sons. [1st ed.].
[15]
IBM (2023, November 19). IBM Industry 4.0. Available online: https://www.ibm.com/topics/industry-4-0.
[16]
(2024, March 18). GMP Data Integrity Definitions and Guidance for Industry, Available online: https://assets.publishing.service.gov.uk/media/5ac4a6cc40f0b60a4be86d80/Data_integrity_definitions_and_guidance_v2_Withdrawn.pdf.
[17]
(2024, March 18). Guidance on Good Data and Record Management Practices. Available online: https://www.gmp-compliance.org/gmp-news/final-who-guidance-document-on-good-data-and-record-management-practices.
[18]
(2024, March 18). Data Integrity and Compliance with CGMP—Questions and Answers, Guidance for Industry, Available online: https://www.fda.gov/regulatory-information/search-fda-guidance-documents/data-integrity-and-compliance-drug-cgmp-questions-and-answers.
[19]
(2024, March 18). Good Practices for Data Management and Integrity in Regulated GMP/GDP Environments. Available online: https://www.gmp-compliance.org/guidelines/gmp-guideline/pic-s-good-practices-for-data-management-and-integrity-in-regulated-gmp-gdp-environments-pi-041-1.
[20]
(2023, November 20). Guidance on Good Manufacturing Practice and Good Distribution Practice: Questions and Answers. Available online: https://www.ema.europa.eu/en/human-regulatory/research-development/compliance/good-manufacturing-practice/guidance-good-manufacturing-practice-good-distribution-practice-questions-answers.
[21]
Kamel "A Proposed Model of IoT Security Management System Based on A study of Internet of Things (IoT) Security" Int. J. Sci. Eng. Res. (2018)
[22]
(2023, November 08). Port of London Authority Cyberattack. Available online: https://techmonitor.ai/technology/cybersecurity/port-of-london-authority-cyberattack.
[23]
(2023, November 08). Significant Cyber Incidents. Available online: https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents.
[24]
(2023, November 08). DDoS Attacks on Andorra’s Internet Linked to Squid Game, Minecraft Tournament. Available online: https://therecord.media/ddos-attacks-on-andorras-internet-linked-to-squid-game-minecraft-tournament/.
[25]
(2023, November 08). MediaMarkt Getroffen Door Ransomware-Aanval, Cybercriminelen Dreigen Met Publicatie Gestolen Data. Available online: https://www.rtlnieuws.nl/tech/artikel/5289859/mediamarkt-ransomware-hive-cybercriminelen-onderhandelingen-helpdesk.
[26]
(2023, November 08). Global IT Services Provider Inetum Hit by Ransomware Attack. Available online: https://www.bleepingcomputer.com/news/security/global-it-services-provider-inetum-hit-by-ransomware-attack/.
[27]
(2023, November 08). Virus Attacks: What You Need to Know. Available online: https://www.nordicchoicehotels.com/blog/information/virus-attacks.
[28]
(2023, November 08). French Ministry of Justice Targeted in Ransomware Attack. Available online: https://www.securityweek.com/french-ministry-justice-targeted-ransomware-attack.
[29]
(2023, November 08). BlackCat-Alphv Claims Swissport Ransomware Attack, Leaks Data. Available online: https://www.bleepingcomputer.com/news/security/blackcat-alphv-claims-swissport-ransomware-attack-leaks-data/.
[30]
Jenkinson, A. (2022). Ransomware and Cybercrime, CRC Press. [1st ed.]. 10.1201/9781003278214
[31]
Rohit Shewale (2024, March 17). Cybersecurity Statistics. Available online: https://www.demandsage.com/cybersecurity-statistics/.
[32]
Zhang "Digital Twin-Assisted Edge Computation Offloading in Industrial Internet of Things With NOMA" IEEE Trans. Veh. Technol. (2023) 10.1109/tvt.2023.3270859
[33]
Zhang, L., Wu, S., Xu, H., Liu, Q., Hong, C.S., and Han, Z. (2023). Optimizing Tradeoff Between Learning Speed and Cost for Federated Learning-Enabled Industrial IoT. IEEE Internet Things J., 1. 10.1109/jiot.2023.3330754
Cited By
22
Научно списание „Сигурност и отбран...
Metrics
22
Citations
33
References
Details
Published
Mar 25, 2024
Vol/Issue
13(7)
Pages
1191
License
View
Funding
Poznan University of Technology Award: 0211/SBAD/0121
Cite This Article
Janusz Pochmara, Aleksandra Świetlicka (2024). Cybersecurity of Industrial Systems—A 2023 Report. Electronics, 13(7), 1191. https://doi.org/10.3390/electronics13071191
Related

You May Also Like

Machine Learning Interpretability: A Survey on Methods and Metrics

Diogo V. Carvalho, Eduardo M. Pereira · 2019

1,384 citations

The k-means Algorithm: A Comprehensive Survey and Performance Evaluation

Mohiuddin Ahmed, Raihan Seraj · 2020

1,342 citations

Sentiment Analysis Based on Deep Learning: A Comparative Study

Nhan Cach Dang, María N. Moreno-García · 2020

550 citations