Cybersecurity issues that cannot be ignored in the era of Industry 4.0

In "Industry 4.0", the past boundaries will disappear, and production information technology, sales logistics, parts industry, business information technology and other fields will be linked. The digital world and the real world are increasingly integrated, and the cybersecurity challenge is becoming more and more serious.

ICTs permeate every area of ​​life and work. The boundaries between the digital world and the real world are increasingly blurred. At the same time, cybercrime and cyber espionage are becoming more and more specialized. The traditional prevention methods are not enough to cope with new situations, and the cyber security challenge is becoming more and more serious. Especially after the outbreak of the Snowden incident, cybersecurity issues have attracted global attention.

The availability of reliable and secure information and communication technologies is critical to the German economy. The future project of the German high-tech strategy “Industry 4.0” (the “Fourth Industrial Revolution” project) has a typical meaning. In "Industry 4.0", the past boundaries will disappear, and production information technology, sales logistics, parts industry, business information technology and other fields will be linked. Therefore, information technology systems will encounter many new challenges, viruses will likely attack production equipment, and machines that are not safe may be remotely controlled, causing huge losses to the real world.

In "Industry 4.0", devices and products will be incorporated into the intelligent Internet of Things. The larger and more dynamic the network, the more necessary it is to differentiate each system (from component to product), to clarify its information, and to ensure safe communication. As the network becomes the most important communication medium, cloud computing becomes a central system, and both services and people need more secure and reliable identification. For the high-tech industries in Germany, especially the small and medium-sized enterprises in the machinery and equipment manufacturing industry, taking effective measures to deal with economic espionage is crucial to their survival. In the face of illegal attacks, cloud data should be strongly secured.

All elements of "Industry 4.0", including people, machines, production equipment, applications, products and services, continue to generate data. Only by ensuring real-time integration and efficient analysis of data can resources and production chains be optimized. Big data brings unavoidable problems to corporate information protection and personal privacy protection.

The Fraunhofer Association of Germany is the largest applied research institution in Europe and plays an important role in information security research in Germany and Europe. It made seven recommendations for the German national cybersecurity research agenda “Network Security 2020”.

Defend digital sovereignty. In the core area of ​​information security, Germany must be absolutely independent and must find flexible, third-party-detected security solutions as a cornerstone of trust in ICT-based infrastructure. In addition to the key areas of ICT, we must ensure the independence of German information technology in the services of major future projects across sectors such as “Industry 4.0” and “Internet Economy”.

Information security application research. Information security research must ensure practicality. To establish and operate an application lab that works closely with the company to conduct practical research and validation of the feasibility of system solutions for cybercrime and cyber espionage.

Protected by design protection. Ensure the safety of products, services and solutions throughout their life cycle. From the very beginning, we must consider security issues, promote the integration of various component systems and significantly improve security.

It can be detected by a third party. In order to achieve reliable security, support the development of new technical methods, check the security of components, products, services and solutions throughout the life cycle, and make the achieved security provable.

Protect privacy by design. At the same time protect the economy, state and personal privacy, respond to cybercrime and cyber espionage, especially the importance of personal information protection, such as the importance of customer information for economic development. Illegal network intrusion and information abuse must be prevented by appropriate means and in accordance with the principle of “protecting privacy through design”.

Understand your own security. Efficient and timely mapping of your own safety situation map enables decision makers to make reliable assessments of safety situations and create preconditions for responsible and sustainable behaviour.

User-friendly information security. Information security mechanisms and methods should be user-friendly and should be well-available so that R&D personnel, information security experts, and ordinary people can perform security-related tasks.

In order to maintain Germany's technological sovereignty and independence and maintain Germany's innovative position, special attention is paid to the following research topics.

· Cloud security. Cloud computing is the next revolution in information technology resources. The transfer of hardware and software to the cloud will become a new paradigm of information technology. With cloud computing, companies can dramatically reduce costs. Cloud security research is imperative because many potential users have concerns about cloud security and have refused to use cloud technology. The research focus should include security rule modeling, metrics for security rule modeling and trusted evaluation, authentication information management for cloud environments, cloud computing center threat assessment models, secure virtual environment mechanisms, privacy protection technologies, trust and strategy. Management, fixed devices and mobile devices through cloud infrastructure security synchronization, highly sensitive information cloud utilization models and methods, cloud malware identification and processing, cloud service provider audit control mechanisms.

· Information Physical Integration System (CPS). The information physics fusion system is an embedded system that uses sensors or brakes to evaluate and store information, and communicates through network connections and human-machine interfaces. The information physical fusion system is used in data and signal processing, and has been widely used in aerospace, automobile manufacturing, chemical, energy, medical and health, production and automation, logistics, terminal services and other fields. As its performance increases and the degree of networking increases, new technologies and methods are urgently needed to meet its security and protection needs. His research focuses on the security of networked intelligent interaction technology, special cryptographic procedures and security technologies, security mechanisms combined with software and hardware, emergency response when attacked, security level standard detection methods, distributed intelligent sensing mechanisms and many other issues.

· Data protection and privacy management. The problem of illegal trading of personal information has become increasingly prominent. Many large companies, such as banks and communication companies, have encountered such problems, which not only damage the company's image, but also cause economic losses. Personal information protection has become a core topic in research and society.

· Energy production and supply. The energy Internet is an extremely important infrastructure, and the development of smart grids requires attention to new risks. From the interconnection of power producers, storage, power grids to end users, to control, smart grids mean more communication between the various links and more unknown risks. Research in this area focuses on the establishment of smart grids and the security of smart grids.

· Early warning system. With the development of the network, various malware are constantly appearing, and it is difficult for information system operators to timely inform and protect new threats. It is important to use the information early warning system to deal with network accidents early. There are still many problems to be solved in this area, such as early warning systems for emerging applications and botnet problems.

· Information technology forensics. Network committers will leave traces. The task of information technology forensics is to discover, identify and analyze these traces. The main research tasks include: developing programs that automatically and efficiently identify prohibited content for various media types, and programs that identify prohibited content from information fragments after deleting information; quickly classifying big data and quickly and automatically retrieving pictures and videos in big data. The way of content.

· Traffic information technology security. More and more car features are implemented in software. Automotive networking and car networking will gradually open up to the outside world, bringing many security issues to automakers, suppliers and service providers, as well as new markets and new opportunities.

Face Mask

Face Mask,Medical Face Mask,Disposable Face Mask,Disposable Protective Mask

Ningbo Anbo United Electric Appliance Co.,ltd , https://www.airfryerfactory.com