ARCHIVES

Research Article

Enhancing Cybersecurity in Smart Manufacturing: A Comprehensive Approach

Anupriya Bharti1 Dr. Bramah Hazela2
1 PG student, Department of Engineering and Technology, Amity University, Lucknow, Uttar Pradesh, India. 2Assistant Professor G-III and Program Leader, Amity University, Lucknow Campus, Lucknow, Uttar Pradesh, India.

Published Online: May-August 2024

Pages: 192-201

Abstract

The industry 4.0 defines a new era of much efficient and intelligent manufacturing processes that works in integration with other advanced technologies like AI, Big data, Block chain, etc. The smart manufacturing industry has remarkably evolved due to integration of advanced technologies like cyber-physical systems (CPS), Internet of Things (IoT), digital twins that makes up a highly connected infrastructure where data flows in real time. However, the involvement of these technologies has also significantly increased the exposure of manufacturing industry to the cyber threats. This article investigates several security challenges and major threats that are associated with the manufacturing industry. It evaluates various security implementations including digital twins, machine learning, and block chain based on their effectiveness, scalability, and feasibility in terms of security. Through a comprehensive literature review, case study analysis of notable cyberattacks and qualitative exploratory methods, this study explores the best line of defence against the cyber threats. Our findings highlight the critical role of robust and adaptive multiple line of defense mechanisms in mitigating cyber risks. The research concludes by emphasizing the need for an effective security strategy that combines advanced technological solutions with continuous employee education and proactive threat management to safeguard smart manufacturing processes against evolving cyber threats.

Related Articles

2024

Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development

2024

Website Development in Computer Science: Unveiling the Digital World

2024

Review on RSA Cryptography, Steganography and Compression Techniques for Data Security

2024

Stock Price Prediction Using LSTM

2024

Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler

2024

Online Auction App

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20240302030

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.