WIBU-SYSTEMS

Perfection in Protection, Licensing, and Security

Trustworthiness in Operating Industrial Systems

MarketingWIBU-SYSTEMS AG el 17 de agosto de 2022 7:58 horas

In the Fall 2018 issue of the Industry IoT Consortium (IIC)’s Journal of Innovation, I published an article on Trustworthiness in Industrial System Design. The article introduced trustworthiness as an integral part of the design of industry IoT systems, and in particular, put forward the concept of Trustworthiness Methods as an important implementation technique and the Trustworthiness Systems Status for assigning trustworthinesss methods to keep the system in a specific status.

Perhaps not as dramatic as the recently released sequel to the popular American film Top Gun (Top Gun: Maverick), a sequel to the afore mentioned article appears in the July 2022 issue of the IIC Journal of Innovation. This new essay, titled Trustworthiness in Operating Industrial Systems, extends the trustworthiness concept to the actual operation of industry IoT Systems. This piece defines the key terms − incidents, hazards, accidents, software bugs, threats, attacks and perils − and discusses them in the context of the Trustworthy System Status Model and Trustworthiness Security Methods. 

Here is a closer look at the key terms and their definitions:

  • Incident: The event that a peril targets the system.
  • Hazard: A peril which results in an accident if it targets the system. A hazard occurs randomly and may be visible or hidden.
  • Software Bug: A hazard in the design or implementation of software.
  • Threat:  A peril which results in an attack if it targets the system. A threat occurs intentionally and is mostly visible but may be hidden in rare cases.
  • Peril: A peril is either a hazard or a threat. All specific hazards and threats to a system is the Perils of the System
  • Accident: The result of a hazard-caused incident. The system should be protected with a Trustworthiness Reliability, Safety, Resilience or Privacy Method.
  • Attack: The result of a threat-caused incident. The system should be protected with a Trustworthiness Security Method.

In general, a system is protected against hazards with Trustworthiness Methods: If the process inside the system requires protection (preventing a disruption), they are Reliability Methods; if humans need to be protected from harm of a hazard, they are Safety Methods; If personal information needs protection, they are Privacy Methods; and if the system itself requires protection, they are Resilience Methods.

If such methods cannot defend successfully against a hazard-caused incident, the status of a normally running system leads to disruption. And if the hazard cannot be stopped in the status of the interrupted system, there is a risk of damage or even total loss of the system.

If you are involved with industrial IoT systems, I invite you read the full article and gain an in-depth understanding of the key issues in designing and operating trustworthy industry IoT systems, courtesy of IIC.

Inicie sesión o regístrese ahora y disfrute de todas las ventajas de una comunidad.

Para obtener toda la funcionalidad del Foro de IndustryArena es necesario iniciar sesión o registrarse. Este proceso es absolutamente gratuito.

Password forgotten?
Solicitud de contacto
Guest Photo
Your message
The controller within the meaning of Art. 4(7) GDPR is: IndustryArena GmbH, Schneiderstr. 6, 40764 Langenfeld, Germany.
You may reach our data protection officer under dataprotection@industryarena.com.

Purpose of processing
We process your personal data concerning the use of the contact form and the communication with the company of the newsroom as well as the transmission of your data to this company in accordance to Art. 6 (1a) GDPR. This constitutes a legitimate interest for us in accordance to Art. 6 (1f) GDPR.

Recipient of the data
Within our organization, those units gain access to your data, which are necessary to fulfil the above purposes.
Personal data will only be transmitted to third parties if this is necessary for the aforementioned purposes or if another legal basis exists. If necessary, we conclude the corresponding data protection agreements with third parties, in particular pursuant to Art. 28 GDPR.

Data storing
Your data will be transmitted to the company of the newsroom for further processing. The period of storing is the duration of the processing of your request by the respective company.

Seleccionar persona de contacto

Newsroom Logo

Opciones de diseño

  • Título Color de fuente:
  • Contenido Color de fondo:
  • Contenido Color de fuente:
  • Navegación Fondo:
  • Ficha Color de fuente:
  • Pestaña activa Color de fuente:
  • Enlace Color de fuente:
  • Enlace activo Color de fuente:
  • Imagen de fondo Color de fondo

    ¿Cómo quieres colocar la imagen de fondo?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Establecer el enlace para la imagen de fondo

  • Gráfico de cabecera

    ¿Cómo desea alinear el banner?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Introduzca el destino del enlace para el banner

  • Skyscraper

    Introduzca el destino del enlace para el Skyscraper

Tenga en cuenta:

Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.