Author
Listed:
- Kondiloglu Adil
(Vocational School of Technical Sciences, Giresun University)
- Bayer Harun
(Akcadag Vocational School, Inonu University)
- Celik Enes
(Babaeski Vocational School, Kirklareli University)
- Atalay Muhammet
(Faculty of Economics and Administrative Sciences, Kirklareli University)
Abstract
The object of research is fourth industrial revolution. The fourth industrial revolution has been a blend of technologies that lead to the creation of a «smart» and versatile «cyber-physical'» production environment. It has included various intelligent sensors, personal configuration robots, 3D printers, communication channels that is used for large data analysis and large data collecting. These communication channels have too many risks in terms of personal or public information security. At the beginning of this innovation period, legal regulations and standards have been ignored just as in the first, second and third revolutions. Cyber security has not operated in full capacity today because the technologies, concepts and protocols that used for the operations of industry have not been connected to each other. In this perspective, it can be said that in Industry 4.0 cyber security has been so important and it is the subject of this research. This study is intended to investigate information security vulnerabilities and measures in Industry 4.0. A security plan which is proportional to organizational structures for the identification of cyber security protocols for Industry 4.0 is proposed. With the proposed approach plans, information security can be ensured in Industry 4.0 and valuable information can be protected against attacks.
Suggested Citation
Kondiloglu Adil & Bayer Harun & Celik Enes & Atalay Muhammet, 2017.
"Information security breaches and precautions on Industry 4.0,"
Technology audit and production reserves, 6(38) 2017, Socionet;Technology audit and production reserves, vol. 6(4(38)), pages 58-63.
Handle:
RePEc:nos:dcchxh:10
Download full text from publisher
More about this item
Keywords
;
;
;
;
JEL classification:
- M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management
Statistics
Access and download statistics
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:nos:dcchxh:10. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Алина Макаренко (email available below). General contact details of provider: http://socionet.ru/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.