O conceito da segurança da informação como estratégia organizacional no contexto da Indústria 4.0
DOI:
https://doi.org/10.7769/gesec.v14i1.1571Keywords:
Indústria 4.0, Segurança da Informação, EstratégiaAbstract
A Indústria 4.0 traz consigo um papel importante para os Sistemas de Informação, uma vez que, todos os sistemas inteligentes são interconectados com redes com ou sem fio e passam a tomar suas próprias decisões, percebe-se que ataques cibernéticos a essas redes causarão falhas de produção irreparáveis ou danos graves. Para aumentar a segurança da informação, é necessário abordar os riscos cibernéticos e identificar estratégias de segurança. Buscando prevenir possíveis ataques a rede. O objetivo do estudo é mostrar a importância de se abordar a segurança da informação como parte da estratégia organizacional na Indústria 4.0. O método de pesquisa foi uma revisão bibliográfica utilizando como fonte de informações as publicações sobre a temática encontradas em Bases de dados eletrônicas. O estudo concluiu que é nítida a necessidade do uso da estratégia da segurança nas organizações no contexto da Indústria 4.0, por motivos como, maior conectividade a redes cibernéticas, maior transação de dados e informações confidenciais.
Downloads
References
A., C. Paradigm shift and challenges in IoT security. Journal of Physics: Conference Series, v. 1432, n. 1, 2020. DOI: https://doi.org/10.1088/1742-6596/1432/1/012083
AHMAD, A.; MAYNARD, S. B.; PARK, S. Information security strategies: Towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 2012. DOI: https://doi.org/10.1007/s10845-012-0683-0
ALEXANDRIA, J. C. S. DE; QUONIAM, L. M.; RICCIO, E. L. Gestão da Segurança da Informação – Uma Proposta para Potencializar a Efetividade da Segurança da Informação em Ambiente de Pesquisa Científica. [s.l: s.n.].
BS 7799. BS 7799: code of practice for information security management as a base for certification. 1999.
CHENG X.A, B, Z. P. . Information Security and Adoptable Solutions in the Implementation of Industry 4.0 Strategy for the Fourth-generation Industrial Revolution. Journal of Physics: Conference Series, v. 1682, n. 1, 2020. DOI: https://doi.org/10.1088/1742-6596/1682/1/012087
CNI, C. N. DA I. Desafios para indústria 4.0 no Brasil. Confederação Nacional da Indústria, n. INDUSTRIA 4.0, p. 34, 2016.
EFE A.A, I. A. . A general view of industry 4.0 revolution from cybersecurity perspective. International Journal of Intelligent Systems and Applications in Engineering, v. 8, n. 1, p. 11–20, 2020. DOI: https://doi.org/10.18201/ijisae.2020158884
ILVONEN I.A,THALMANN S.B,MANHART M.C, S. C. . Reconciling digital transformation and knowledge protection: A research agenda. Knowledge Management Research and Practice, v. 16, n. 2, p. 235–244, 2018. DOI: https://doi.org/10.1080/14778238.2018.1445427
JAVAID, M. et al. Diabetes & Metabolic Syndrome : Clinical Research & Reviews Industry 4 . 0 technologies and their applications in fi ghting COVID-19 pandemic. Diabetes & Metabolic Syndrome: Clinical Research & Reviews, v. 14, n. 4, p. 419–422, 2020. DOI: https://doi.org/10.1016/j.dsx.2020.04.032
LEVY, YAIR; ELLIS, T. J. A systems approach to conduct an effective literature review in support of information systems research. Informing Science: International Journal of an Emerging Transdiscipline, v. 9, n. 1, p. 181–212, 2006. DOI: https://doi.org/10.28945/479
M., P. Secure production within the iiot - hardware-based security solutions protect data and systems. ZWF Zeitschrift fuer Wirtschaftlichen Fabrikbetrieb, v. 112, n. 4, p. 257–260, 2017. DOI: https://doi.org/10.3139/104.111705
MOSTEIRO-SANCHEZ A.A, BARCELO M.A, ASTORGA J.B, U. A. . Securing IIoT using Defence-in-Depth:Towards an End-to-End secure Industry 4.0. Journal of Manufacturing Systems, v. 57, p. 367–378, 2020. DOI: https://doi.org/10.1016/j.jmsy.2020.10.011
RAPOSO, D. R.; REIS, A. J. DA R. Indústria 4.0: Realidade, Mudanças e Oportunidades. [s.l.] Universidade Federal de Ouro Preto, 2018.
SHAABANY G.,FRISCH S., A. R. Secure concept for online trading of technology data in global manufacturing market. IFIP Advances in Information and Communication Technology, v. 517, p. 690–700, 2017. DOI: https://doi.org/10.1007/978-3-319-72905-3_61
SÜ, A. A. A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4 . 0 Ecosystem. n. February, p. 1–12, 2020. DOI: https://doi.org/10.5815/ijcnis.2020.01.01
TAMY S.A,BELHADAOUI H.A,RABBAH N.B, R. M. . Cyber security based machine learning algorithms applied to industry 4.0 application case: Development of network intrusion detection system using hybrid method. Journal of Theoretical and Applied Information Technology, v. 98, n. 12, p. 2078–2091, 2020.
ZIA N.U., O. V. K. A viewpoint on management practices for cybersecurity in industry 4.0 Environment. European Conference on Information Warfare and Security, ECCWS. Anais...2020
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
• 1. The author(s) authorize the publication of the article in the journal.
• 2. The author(s) ensure that the contribution is original and unpublished and is not being evaluated in other journal(s).
• 3. The journal is not responsible for the opinions, ideas and concepts expressed in the texts because they are the sole responsibility of the author(s).
• 4. The publishers reserve the right to make adjustments and textual adaptation to the norms of APA.
• 5. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• 6. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• 7. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access) at http://opcit.eprints.org/oacitation-biblio.html