13
DAWSON RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY THROUGH CYBER ATTACKS IN MANUFACTURING

RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the

DAWSON

RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY THROUGH CYBER ATTACKS IN MANUFACTURING

Page 2: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the

TABLE OF CONTENTS

CONCLUSION

IOT IN MANUFACTURING

INTELLIGENCE GATHERING AND ANALYSIS56

4

EUROPEAN CYBER ATTACKS

ABSTRACT

HISTORY23

1

Page 3: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 4: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the

A LITTLE HISTORY

1750-1850 1870-1914 1980s CURRENT

THIRD INDUSTRIAL REVOLUTION

Computer and automation

FOURTH INDUSTRIAL REVOLUTION

Cyber Physical Systems

FIRST INDUSTRIAL REVOLUTION

Mechanization, water power, steam power

SECOND INDUSTRIAL REVOLUTION

Mass prodution, assembly line, electricity

Page 5: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 6: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the

Estonia’s crisis was merely a taste of things to come. Another major incident occurred the following year. were believed to have secretly launched Stuxnet, a malicious computer worm, to sabotage centrifuges at a uranium enrichment plant in Iran. The Iranian authorities didn’t even realise the nuclear plant had been under attack until two years later.

Page 7: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 8: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 9: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 10: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 11: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 12: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the
Page 13: RISE OF INDUSTRIAL 4.0: CRIPPLING A COUNTRY CYBER … · IOT IN MANUFACTURING 5 INTELLIGENCE GATHERING AND ANALYSIS 6 4 EUROPEAN CYBER ATTACKS ABSTRACT 2 HISTORY 3 1. ... eludes the

CONCLUSION

BASELINEAs this new industrial revolution is taking groundit will be key to establish what a baseline secureconfiguration would be for this manufacturing plants.

CERTIFICATION & ACCREDITATION

This will include a minimum set of security controlsevery organization will need to have before gainingan Approval to Operate (ATO).

TIGHTER REGULATIONSThis will include tighter regulatory polices, employee education, and hardened technology that is used withinthe boundaries of the network.