A questionnaire study on the use of access control in industrial systems

B Leander, A Čaušević, T Lindström… - 2021 26th IEEE …, 2021 - ieeexplore.ieee.org
2021 26th IEEE International Conference on Emerging Technologies …, 2021ieeexplore.ieee.org
Industrial systems have traditionally been kept isolated from external networks. However,
business benefits are pushing for a convergence between the industrial systems and new
information technology environments such as cloud computing, as well as higher level of
connectivity between different systems. This makes cybersecurity a growing concern for
industrial systems. In strengthening security, access control is a fundamental mechanisms
for providing security in these systems. However, access control is relatively immature in …
Industrial systems have traditionally been kept isolated from external networks. However, business benefits are pushing for a convergence between the industrial systems and new information technology environments such as cloud computing, as well as higher level of connectivity between different systems. This makes cybersecurity a growing concern for industrial systems. In strengthening security, access control is a fundamental mechanisms for providing security in these systems. However, access control is relatively immature in traditional industrial systems, as compared to modern IT systems, and organizations' adherence to an established cybersecurity standard or guideline can be a deciding factor for choices of access control techniques used. This paper presents the results of a questionnaire study on the usage of access control within industrial system that are being developed, serviced or operated by Swedish organizations, contrasted to their usage of cybersecurity standards and guidelines. To be precise, the article focuses on two fundamental requirements of cybersecurity: identification and authentication control, and presents related findings based on a survey of the Swedish industry. The goal of the study is breaching the gap between the current state and the requirements of emerging systems with regards to access control.
ieeexplore.ieee.org
Showing the best result for this search. See all results