Application of Asset Management in Managing Cyber Security of Complex Systems

Author(s):  
H. Boyes ◽  
T. Watson ◽  
P. Norris
2022 ◽  
pp. 209-240
Author(s):  
John Andrews

Railway infrastructure comprises a large collection of diverse and complex systems and structures. Many of them are aging assets and require a significant budget to deliver the maintenance to ensure the required safety and service performance standards. With such a large amount of money spent each year to maintain and renew the network assets, small percentage savings can amount to substantial sums of money. There is therefore a huge incentive to better understand the degradation that assets experience and how these can be effectively managed through the implementation of efficient maintenance strategies. Track and bridges are the most expensive assets to keep in the required condition, and this chapter provides a method to analyse their degradation and build Petri net models to predict the future state of the asset, the number of each maintenance activity which are expected to be undertaken, and their costs experienced by following a particular strategy. Utilising these models enables the quality of the asset management decisions made to be improved and optimised.


Information ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 460
Author(s):  
Noritaka Matsumoto ◽  
Junya Fujita ◽  
Hiromichi Endoh ◽  
Tsutomu Yamada ◽  
Kenji Sawada ◽  
...  

Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. However, the timely and coherent asset management methods used for conventional IT systems are difficult to be implemented for IIoT systems. This is because these systems are composed of various network protocols, various devices, and open technologies. Besides, it is necessary to guarantee reliable and real-time control and save CPU and memory usage for legacy OT devices. In this study, therefore, (1) we model various asset configurations for IIoT systems and design a data structure based on SCAP (Security Content Automation Protocol). (2) We design the functions to automatically acquire the detailed information from edge devices by “asset configuration management agent”, which ensures a low processing load. (3) We implement the proposed asset management system to real edge devices and evaluate the functions. Our contribution is to automate the asset management method that is valid for the cyber security countermeasures in the IIoT systems.


2021 ◽  
Vol 31 (3) ◽  
Author(s):  
Anna Karmańska

The main objective of this paper is to identify the benefits and challenges of the Internet of Things (IoT) application in the accounting field of organisations. The study adopts a questionnaire and an interview technique in a company from the road transport sector. The questionnaire research sample includes 151 accounting practitioners and students. Data are collected through the use of an online survey. A principal axis factor analysis with the promax rotation is conducted to assess the underlying structure for the items of the questionnaire. The research outcomes indicate that, in the opinion of accountants and students, the IoT adoption enables the organisation to perform enhanced reporting analysis based on large amount of data gained through sensors (mean=3.98), access to data thorough cloud computing (3.97), and accounting process automation (3.95). From the point of view of managers, the most important benefit is the increase in employee productivity and asset management. The respondents indicate the following aspects as challenges: creation of infrastructure for the adoption a new technology, which accounted for 40.22% of the variance, and cyber security, loss of privacy (7.23% of the explained variance). The findings reveal benefits and challenges for the IoT adoption and could support managers in deploying a new technology in their organisations. The research limitation concerns the fact that this study focuses on respondents from Poland.


2021 ◽  
pp. 394-408
Author(s):  
Roger Bradbury

This chapter considers the problem of educating for cybersecurity from the perspective of complex systems science. It argues that education is a process that has evolved in human social systems to curate, increase, and transmit the information needed for system survival. Education creates an increase in the negentropy (or useful information) of those systems as they seek to maximize the acquisition and throughput of energy—a physical principle known as maximum entropy production (MaxEP). Civilizations have responded to this principle over time by finding new solutions to the Earth’s MaxEP and becoming more complex in the process. A key part of this complexification is education. And in the present cyber age it is, as in previous ages, a lagging process cobbled together from the structures and processes of previous ages. The current education responses may soon be superseded as a new solution to the Earth’s MaxEP—the technological singularity—looms.


Author(s):  
Zhenghui Sha ◽  
Jitesh H. Panchal

The human society is facing new challenges, such as cyber-security, environmental safety, and energy sustainability, which cannot be solved by a single engineering product or system. When seeking ways to address the challenges in order to meet fundamental human needs, the solutions often lead to large-scale complex systems. In complex systems, there are large numbers of interactive entities that work together to form a system of value greater than the sum of the individuals.


2019 ◽  
Vol 26 (2) ◽  
pp. 245-266 ◽  
Author(s):  
Erika A. Parn ◽  
David Edwards

Purpose Smart cities provide fully integrated and networked connectivity between virtual/digital assets and physical building/infrastructure assets to form digital economies. However, industrial espionage, cyber-crime and deplorable politically driven cyber-interventions threaten to disrupt and/or physically damage the critical infrastructure that supports national wealth generation and preserves the health, safety and welfare of the populous. The purpose of this paper is to present a comprehensive review of cyber-threats confronting critical infrastructure asset management reliant upon a common data environment to augment building information modelling (BIM) implementation. Design/methodology/approach An interpretivist, methodological approach to reviewing pertinent literature (that contained elements of positivism) was adopted. The ensuing mixed methods analysis: reports upon case studies of cyber-physical attacks; reveals distinct categories of hackers; identifies and reports upon the various motivations for the perpetrators/actors; and explains the varied reconnaissance techniques adopted. Findings The paper concludes with direction for future research work and a recommendation to utilize innovative block chain technology as a potential risk mitigation measure for digital built environment vulnerabilities. Originality/value While cyber security and digitization of the built environment have been widely covered within the extant literature in isolation, scant research has hitherto conducted an holistic review of the perceived threats, deterrence applications and future developments in a digitized Architecture, Engineering, Construction and Operations (AECO) sector. This review presents concise and lucid reference guidance that will intellectually challenge, and better inform, both practitioners and researchers in the AECO field of enquiry.


Sign in / Sign up

Export Citation Format

Share Document