Cyber-security and Software dependability
Cyber-security and Software dependability
Cyber-security of industrial installation and Internet Industrial of Objects (IIoT)
Jean-Maris FLAUS (Université Joseph Fourier de Grenoble)
Cybersecurity of industrial plants, of cyber-physical systems and more generally of IIoT (Industrial IoT) is an up to date problematics.
It is at first a problem due to technological evolution of plants: the plants include more and more connected objects reachable through Internet. The well spread idea of an industrial computer installation which can be operated stand alone far from cyber threats is now bygone.
The regulation evolution such as LPM2013 (loi de programmation militaire) gives new rules face to Internet. As far as Vital Importance Operators (OVI)are concerned, public authorities ask companies to implement precise steps to master cyber-security along with the risk of heavy fines in case of non compliance.
Finally due to evolution of actors of cybercrime, who realized the potential of cyberattacks and implement huge means in this field. The era of fiddler hacker belongs to the past and most of the computer malevolence is nowadays motivated by money. This evolution of crime lets a new vulnerability appear, linked to internal actors of the company who access to sensible resources. This reinforces the need of a global approach to master the cyber-risk taking into account the human factor.
This approach has to be specific. In fact, systems of industrial computers are different of systems of classical computers, such as, for instance:
Face to the threat concerning system security, companies have first to realize the risk and adopt methodologies and tools to evaluate it. When the risk is not acceptable any longer, adapted and pertinent measures have to be implemented.
To accomplish these tasks, approaches have been proposed, by example by ANSSI, and a few technical solutions exist, but the topic is still ill masterized. It remains difficult to know which approach adopt, to determine the necessary means and to determine their pertinence in a given context. The approach articulation related to company risk management, namely relative to computer security is also a major issue.
The WG objective is to organize the existing knowledge, to evaluate it face to actual stresses and feedback experience, and to let emerge blocking points, being technical, human or organizational.
The WG aims to allow actors concerned by cyber-security of industrial plants and IIoT to share knowledge and experience. Evaluation actions of existing solutions as well as technical and statutory watch can be implemented. Guides and working days of sensitization could be realized. The group also aims at meeting other bodies or associations to place its problematics relative to global cyber security and let emerge methodologic development and research questions.