Digital twins, the industrial Internet of Things and cyber security threats in connected industry
Mark Hearn
Additional contact information
Mark Hearn: Director, IoT Security and Business Development, Irdeto
Cyber Security: A Peer-Reviewed Journal, 2019, vol. 3, issue 2, 116-123
Abstract:
The industrial and manufacturing sector has already experienced significant transformation with the introduction of automation and is now being transformed due to connectivity. There is real potential for the sector to reinvent itself around the Industrial Internet of Things (IIoT) and smart technology as the benefits are numerous. However, this increased connectivity in manufacturing environments and industrial control systems also increases the attack surface for the software, IP and critical processes which could result in disastrous consequences if not properly addressed. The dangers are also actually more complex than you may at first imagine, particularly when you take into account technological advances such as digital twins — designed to provide business benefit in a predictive and operational context, but could actually add to an organisation’s vulnerabilities, if not properly secured. This paper analyses the specific considerations that are crucial with connectivity and smart technology in industrial environments and industrial control systems. Areas discussed include: how to understand how hackers may target your business; the role of digital twins in manufacturing and industry and the potential security risks; how to upgrade the cyber security of connected industry and manufacturing in the face of wider IIoT threats.
Keywords: digital twins; IIoT; connected manufacturing; industrial cyber security; connected industry (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2019
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/5317/download/ (application/pdf)
https://hstalks.com/article/5317/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2019:v:3:i:2:p:116-123
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().