Safeguarding Devices—Not Just Data—From Cyberattack
Safeguarding Devices—Not Just Data—From Cyberattack


Already a member? Log in.
This content is reserved exclusively for ASME Members.
Get access to these articles & other ASME Membership Benefits
✓
& much more!
✓
Technical Divisions & Sections
✓
Mechanical Engineering Magazine
✓
ASME Smart Brief
✓
ASME News
✓
Journal Discounts
✓
Free Codes & Standards Summary Books
✓
TechDesign and TechReboot Newsletters
✓
AccessEngineering
✓
ASME Conference Discounts
✓
Free Learning & Development Courses
✓
TEC Talk Webinar Series
✓
ASME Career Center
✓
Digital Article Pack or Free Quarterly E-Book Download
Access to Membership Benefits may take up to 24 hours to process.
Once, industrial equipment, assets, and processes operated in isolation and were vulnerable only to physical attack. In today’s digitized world, however, barbed wire, concrete walls, checkpoints, and other traditional safeguards are only part of the infrastructure security playbook.
Exponentially expanded by the network-connected and ubiquitous agglomeration of Industry 4.0 and Industrial Internet of Things (IIoT) sensors and data processing engines, the attack surface extends to environments that include manufacturing facilities, supply chains, and most alarmingly, critical infrastructure sectors.
Exponentially expanded by the network-connected and ubiquitous agglomeration of Industry 4.0 and Industrial Internet of Things (IIoT) sensors and data processing engines, the attack surface extends to environments that include manufacturing facilities, supply chains, and most alarmingly, critical infrastructure sectors.