Abstract
The paper contains the results of the analysis of methodologies and standards obtaining the requirements to security management systems of enterprises including modern enterprises implementing Industry 4.0 principles. Key standards ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analyzed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system is part of the enterprise management system and based on cybernetic principle of control. These subsystems check and control according with individual and general objectives for physical, information and signal spaces and requirements-based models. The goal of the paper is to analyze the methodologies for developing an integrated security management system structure as a component of enterprise management systems in the context of Industry 4.0. The obtained results and recommendations for enhancing and implementation these systems are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Roberto, M.: An integrative model of information security awareness for assessing information systems security risk. In: Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 3258–3267 (2012)
Systems Integration for Industry. https://www.automation.com/automation-news/article/systems-integration-for-industry-40. Access date: Dec 2010
Smarter Security for Manufacturing in The Industry 4.0. Era Industry 4.0 Cyber Resilience for the Manufacturing of the Future. White HITE paper https://www.symantec.com/content/dam/symantec/docs/solution-briefs/industry-4.0-en.pdf. Access date: Dec 2019
Kondiloglu, A., Bayer, H., Celik, E., Atalay, M.: Information security breaches and precautions on INDUSTRY 4.0. Technol. Audit Prod. Reserves6/4(38), 58–63 (2017)
ISO/IEC 7498-1:1999: Information technology. Open systems interconnection. Basic reference model. Part 1: The Basic Model (1999)
ISO/IEC 7498-2:1999: Information technology. Open systems interconnection. Basic reference model. Part 2: Security Architecture (1999)
ISO/IEC 15408-1:2009: Informational technology—security techniques—evaluation criteria for IT security. Part 1: Introduction and General Model (2009)
ISO/IEC 15408-3:2008: Informational technology—security techniques—evaluation criteria for IT security. Part 3: Security Assurance Requirement (2008)
ISO/IEC 18045:2008: Informational technology—security techniques—methodology for IT security evaluation (2008)
IEC 62264-1:2014: Enterprise-control system integration. Part 1: Models and Terminology (2014)
Kharchenko, V., Dotsenko, S., Illiashenko, O., Kamenskyi, S.: Integrated cyber safety and security management system: industry 4.0 issue. In: Proceedings of the 10th IEEE Dependable Systems, Services and Technologies Conference, DESSERT 2019, pp. 197–201 (2019)
Ackoff, R., Sasieni, M.: fundamentals of operations research hardcover. J. Nano Electron. Phys. https://doi.org/10.21272/jnep.11(2).02013. Access date: Dec 2019
Dotsenko, S., Illiashenko, O., Kamensky, S., Kupreishvili, D., Kharchenko, V.: Analysis of methodological foundations of enterprises’ information-managing systems formation in industry 3.0: movement towards industry 4.0. Radioelectron. Comput. Syst. 2(90), 9–44 (2019)
Pospelov, G., Irikov, V.: Program-Targeted Planning and Management (Introduction), p. 440. Sov. Radio, Moscow (1976)
Meltzer, M.: Interactive Production Management (Models and Algorithms), p. 240. Finance and Statistics, Moscow (1983)
Epshtein, V., Senichkin, V.: Language Tools of the ACS Architect, p. 136. Energy, Moscow (1979)
Mesarovic, M.D., Takahara, Y: General Systems Theory: Mathematical Foundations. Systems Research Center Cleveland, Ohio Case Western Reserve University Academic Press, New York San Francisco London (1975)
Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31(1), 83–95 (2012)
Acknowledgements
This work was supported by the ECHO project, which has received funding from the European Union’s Horizon 2020 research and innovation programme under the grant agreement no 830943.
The authors very appreciated to scientific society of consortium and in particular the staff of Department of Computer Systems, Networks and Cybersecurity of National aerospace university “KhAI” for invaluable inspiration, hardworking and creative analysis during the preparation of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Dotsenko, S., Illiashenko, O., Kamenskyi, S., Kharchenko, V. (2021). Embedding an Integrated Security Management System into Industry 4.0 Enterprise Management: Cybernetic Approach. In: Tagarev, T., Atanassov, K.T., Kharchenko, V., Kacprzyk, J. (eds) Digital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84. Springer, Cham. https://doi.org/10.1007/978-3-030-65722-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-65722-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65721-5
Online ISBN: 978-3-030-65722-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)