Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The New Standard for Cyber Security

View through CrossRef
ABSTRACT Historically, Cyber Security has been limited to software. Because of IPC 1782, IPC 2581, and IPC 2591, it is possible to know exactly what hardware is in any electronic device. Therefore, hardware can be part of the Cyber Security solution. In addition, by coupling the hardware and software Cyber Security approaches with the Framework for End to End in Situ Monitoring described in Section 9.5 of ETSI GS NFV-REL 004 V1.1.1 (2016-04), a comprehensive Cyber Security solution can be created. Implementing IPC 1782, IPC 2581, and IPC 2591 with a very innovative labeling system within a factory and across the Supply Chain will increase yields, improve Quality, and Improve Reliability, as well as, make these items much more predictable. In addition to productivity gains, implementing these standards across the Supply Chain will fight counterfeits systematically. Because counterfeiters are opportunistic and operate in the “'dark” by surprise attacks, they are like guerilla fighters in a sense. The best way to deal with this type of “attack” is by taking a systematic approach and shining light, by sharing information, where there is currently darkness. Combining these three IPC standards with other technologies such as innovative tagging technologies, Blockchain, The Cloud, and Big Data Tools enable unprecedented productivity gains not seen since interchangeable parts enabled the Industrial Revolution, as well as, the ability to catch counterfeits in situ before the components go through the next process step in a factory. This can be done regardless of the path taken from the original manufacturing site to the next downstream manufacturer. The true beauty of this approach is that no single entity shoulders the cost of this solution. Variability causes yield, quality, reliability (quality over time), and product safety issues. Interchangeable parts enabled the industrial revolution because they addressed variability. What gets measured tends to get managed. This combination of tools enables a tailorable solution that is proportionate to the need and available resources. Therefore, this solution fits very well with Smart Factory/Industry 4.0, materially increases productivity, and can be utilized to create entirely new business models, as well as, a practical way to address the risk of counterfeits and Cyber Security for a very long time.
Surface Mount Technology Association
Title: The New Standard for Cyber Security
Description:
ABSTRACT Historically, Cyber Security has been limited to software.
Because of IPC 1782, IPC 2581, and IPC 2591, it is possible to know exactly what hardware is in any electronic device.
Therefore, hardware can be part of the Cyber Security solution.
In addition, by coupling the hardware and software Cyber Security approaches with the Framework for End to End in Situ Monitoring described in Section 9.
5 of ETSI GS NFV-REL 004 V1.
1.
1 (2016-04), a comprehensive Cyber Security solution can be created.
Implementing IPC 1782, IPC 2581, and IPC 2591 with a very innovative labeling system within a factory and across the Supply Chain will increase yields, improve Quality, and Improve Reliability, as well as, make these items much more predictable.
In addition to productivity gains, implementing these standards across the Supply Chain will fight counterfeits systematically.
Because counterfeiters are opportunistic and operate in the “'dark” by surprise attacks, they are like guerilla fighters in a sense.
The best way to deal with this type of “attack” is by taking a systematic approach and shining light, by sharing information, where there is currently darkness.
Combining these three IPC standards with other technologies such as innovative tagging technologies, Blockchain, The Cloud, and Big Data Tools enable unprecedented productivity gains not seen since interchangeable parts enabled the Industrial Revolution, as well as, the ability to catch counterfeits in situ before the components go through the next process step in a factory.
This can be done regardless of the path taken from the original manufacturing site to the next downstream manufacturer.
The true beauty of this approach is that no single entity shoulders the cost of this solution.
Variability causes yield, quality, reliability (quality over time), and product safety issues.
Interchangeable parts enabled the industrial revolution because they addressed variability.
What gets measured tends to get managed.
This combination of tools enables a tailorable solution that is proportionate to the need and available resources.
Therefore, this solution fits very well with Smart Factory/Industry 4.
0, materially increases productivity, and can be utilized to create entirely new business models, as well as, a practical way to address the risk of counterfeits and Cyber Security for a very long time.

Related Results

THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
CYBER SECURITY ETHICS
CYBER SECURITY ETHICS
Cyber Security Ethics- Navigation Privacy and Data Protection is a comprehensive guide designed for professionals, students, and organizations looking to understand the ethical dim...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...

Back to Top