Cyber security for industrial systems (Record no. 6478)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01796nam a22001937a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220107122849.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 190617b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | IIITMK |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Boby Sabu (93617012) |
| 9 (RLIN) | 15780 |
| 245 ## - TITLE STATEMENT | |
| Title | Cyber security for industrial systems |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | MSC CS 2017-2019 |
| 500 ## - GENERAL NOTE | |
| General note | Industrial System is an umbrella term that encompasses several types of<br/>systems including control systems and associated instrumentation used for<br/>industrial process control, for the production of various products. These play<br/>a vital role, directly and indirectly, in our day to day life. With the advent of<br/>digital technology, these systems are also getting a digital handle for operation<br/>control and monitoring. Lack of security of of the digital infrastructure<br/>can lead to serious impacts if misused by an attacker. It is necessary to<br/>safeguard these systems from digital threats by identifying and mitigating the<br/>vulnerabilities, which is to be executed in a pre release phase. In the smart<br/>industrial environment, all devices will be connected to the digital network.<br/>Any malicious device getting connected to the network can seriously impact<br/>the industry ecosystem. Hence we need a solution for securely adding new<br/>devices to the network. Vulnerability assesment and development of secure<br/>device identity management solution for the industrial environment are the<br/>core components of the project. Several commonly occuring vulnerabilities<br/>were identied, and mitigation steps were formulated. Certicate based device<br/>enrollment was implemented for device identity management. |
| 502 ## - DISSERTATION NOTE | |
| Degree type | MSC CS |
| Name of granting institution | 2017-2019 |
| Year degree granted | INT |
| -- | Dr. Tony Thomas |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | DIGITAL NETWORK |
| 9 (RLIN) | 15781 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | DIGITAL THREATS |
| 9 (RLIN) | 15782 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | CYBER SECURITY |
| 9 (RLIN) | 15783 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Non Fiction | IIITM-K | Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | 17/06/2019 | R-1482 | 17/06/2019 | 17/06/2019 | Project Reports |