Javascript must be enabled to continue!
Cybersecurity in Prognostics and Health Management
View through CrossRef
PHM continues to show its value by improving operational efficiencies, increasing safety, reducing downtime, and decreasing cost of operations. PHM technologies are therefore not only being deployed as retrofit solutions but are being integrated into new systems as standard practice. Deployment covers areas such as medical equipment, nuclear power plants, aeronautics applications, oil and gas, mining, and many others. As the impact of PHM increases, it is imperative to also consider the potential vulnerabilities that are being exposed. Hackers have famously used Supervisory Control and Data Acquisition (SCADA) and Programmable Logic Controller (PLC) systems to sabotage industrial facilities. As such, it is important to understand the exposure to malfeasance to ensure that PHM does not end up being the enabling mechanism for unauthorized access to the system it is meant to keep in running order. It is also important to understand the measures that need to be taken to avoid or respond to an attack. These range from extensive penetration testing to conducting extensive counter-social engineering training, setting up a PHM-specific CERT plan and team in place. This paper discusses various threats that are emerging and that may have to be considered when designing a PHM solution. Additionally, the NIST cybersecurity framework is discussed in the context of PHM. Finally, this paper looks at the diagnostic capabilities of PHM systems to detect cyber security attacks and to contain these threats.
Title: Cybersecurity in Prognostics and Health Management
Description:
PHM continues to show its value by improving operational efficiencies, increasing safety, reducing downtime, and decreasing cost of operations.
PHM technologies are therefore not only being deployed as retrofit solutions but are being integrated into new systems as standard practice.
Deployment covers areas such as medical equipment, nuclear power plants, aeronautics applications, oil and gas, mining, and many others.
As the impact of PHM increases, it is imperative to also consider the potential vulnerabilities that are being exposed.
Hackers have famously used Supervisory Control and Data Acquisition (SCADA) and Programmable Logic Controller (PLC) systems to sabotage industrial facilities.
As such, it is important to understand the exposure to malfeasance to ensure that PHM does not end up being the enabling mechanism for unauthorized access to the system it is meant to keep in running order.
It is also important to understand the measures that need to be taken to avoid or respond to an attack.
These range from extensive penetration testing to conducting extensive counter-social engineering training, setting up a PHM-specific CERT plan and team in place.
This paper discusses various threats that are emerging and that may have to be considered when designing a PHM solution.
Additionally, the NIST cybersecurity framework is discussed in the context of PHM.
Finally, this paper looks at the diagnostic capabilities of PHM systems to detect cyber security attacks and to contain these threats.
Related Results
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose
The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION
A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION
In an era where digital threats are increasingly pervasive, understanding the evolution and efficacy of cybersecurity strategies in modern organizations is paramount. This study pr...
THE CYBERSECURITY BLUEPRINT FOR FINANCE
THE CYBERSECURITY BLUEPRINT FOR FINANCE
In today’s increasingly digitized world, financial institutions face an unprecedented level of cyber threats that can compromise critical infrastructure and disrupt the global econ...
Uncertainty in Prognostics and Systems Health Management
Uncertainty in Prognostics and Systems Health Management
This paper presents an overview of various aspects of uncertainty quantification and management in prognostics and systems health management. Prognostics deals with predicting poss...
CYBERSECURITY IN BANKING: A GLOBAL PERSPECTIVE WITH A FOCUS ON NIGERIAN PRACTICES
CYBERSECURITY IN BANKING: A GLOBAL PERSPECTIVE WITH A FOCUS ON NIGERIAN PRACTICES
The paper review cybersecurity practices in banking, with a specific focus on Nigerian banks. Cybersecurity has become a paramount concern in the banking industry worldwide, given ...
Assessing Cybersecurity Vulnerabilities in Higher Education Institutions: A Comparative Perspective
Assessing Cybersecurity Vulnerabilities in Higher Education Institutions: A Comparative Perspective
Abstract
Higher Education Institutions (HEIs) have become increasingly dependent on digital technologies to support teaching, research, administration, and global c...
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
BACKGROUND
In an era of rapid digital transformation, the healthcare sector stands as a beacon of innovation, leveraging the latest technologies to improve ...

