Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 2 de 2
Filter
Add filters

Database
Language
Document Type
Year range
1.
Renewable Energy and Power Quality Journal ; 20:530-535, 2022.
Article in English | Scopus | ID: covidwho-2026301

ABSTRACT

In recent years several efforts have being made in bringing smart network connectivity to the Renewable Energy Plant (REP) environment. On the other hand, REP is extending in scale from specialized points where the energy provider acts as a supplier to home REP (self-energy producers). This enables new important features such as: process automation, monitoring, control and optimizations. On the other hand, and in particular during and after the Covid19 pandemics the cybersecurity menace is a massive concern. The digital literacy of a worker of such an infrastructure is relevant to the correct implementation of adequate security policies. This article describes the threats and challenges on the field and conducts an enquire for perceiving the awareness of Automation and Mechanics Engineering students for this relevant problem, as future player in the field. © 2022, European Association for the Development of Renewable Energy, Environment and Power Quality (EA4EPQ). All rights reserved.

2.
4th ISEA International Conference on Security and Privacy, ISEA-ISAP 2021 ; 2021.
Article in English | Scopus | ID: covidwho-1746052

ABSTRACT

The lifestyle of people in this century will be categorized as Pre-COVID and Post-COVID lifestyle in the future. The pandemic has influenced every nation and every sector. The Internet of Things has helped the humankind to progress even during the pandemic time. Internet of Things has grown drastically with the industry switching their offices to homes. This has also increased the threat landscape and the attacks are also on rise. Several cyber-attacks are possible with Internet of Things devices. However, Supply chain attacks remain the largest threat as reactive measures to mitigate them are extremely difficult. In addition to that, supply chain attacks are difficult to detect in a network. In most of the cases, they remain unnoticed and they are used to launch espionage and ransom ware attacks. The impact of supply chain attacks is also extremely large compared to other attacks. The number of Internet of Things devices are going to grow by leaps and bounds, and it is necessary to take proactive steps in the network to mitigate such attacks. In this article, the elements of Internet of Things supply chain, motivation behind these attacks, vulnerabilities in the supply chain, and recent attacks are discussed in detail. In order to mitigate the supply chain attacks in Internet of Things environment, preventive measures that can be adopted at various levels are also suggested. These measures can be applied as best practices in any smart network environment against supply chain attacks. © 2021 IEEE.

SELECTION OF CITATIONS
SEARCH DETAIL