Refine
Document Type
- Article (1)
- Book (4)
- Part of a Book (1)
- Conference Proceeding (3)
- Contribution to a Periodical (1)
- Working Paper (1)
Is part of the Bibliography
- no (11)
Keywords
- ADAM (2)
- Artificial Intelligence (1)
- Cyber Security (2)
- Cyber-Security (1)
- Cybersicherheit (1)
- Digital Transformation (1)
- Digitale Transformation (1)
- Digitalisierung (1)
- Digitalization (1)
- Energie (1)
- Energie- und Mobilitätswende (1)
- Energieflexibilität (1)
- Energiewende (1)
- Energiewirtschaft (1)
- Forschungsprojekt (1)
- IT-Komplexität (1)
- IT-Strategie (1)
- Industrie 4.0 (2)
- Industrie-4.0-Environments (1)
- Information Management (1)
- Informationsmanagement (1)
- Intelligente Sensorik (1)
- KI (1)
- Künstliche Intelligenz (2)
- Manufacturing Companies (1)
- Mobilitätswende (1)
- Predictive Maintenance (2)
- SMEs (1)
- SV7283 (1)
- SV7382 (1)
- SV7427 (1)
- SV7460 (1)
- Schwachstellen (1)
- Sensorik (1)
- Smart-Meter (1)
- Strategie (1)
- Stromnetz (1)
- Stromversorgung (1)
- Subscription Business (1)
- Vorgehensmodell (1)
- Wohnquartiere (1)
- business model (1)
- condition monitoring (1)
- digital transformation (1)
- energy revolution (1)
- infrared sensor (1)
- machine learning (1)
- manufacturing companies (1)
- produzierende Unternehmen (2)
- switchgear (1)
- thermal monitoring (1)
Institute
The digital transformation is changing the way companies think and design their manufacturing environment. Both due to the increasing number of connections between IoT-Devices, tooling machines, and production lines and the phenomenon of the convergence of IT and OT, systems are becoming more complex than years ago. Organizational and cultural changes within manufacturing companies strengthen this trend and form Industry 4.0 environments and cyber-physical production systems (CPPS). As these systems do not longer stay alone but are connected to each other and the company’s outside, the size of the potential attack surface is increasing as well. Besides that, manufacturing companies, small and medium-sized in particular, are facing complex challenges based on lack of knowledge, budget, and time to understand as well as to interpret their current situation and risk level and therefore to derive necessary counter-measures. Efficient as well as pragmatic tools and methods for these companies do not exist. This paper shows a research approach in which the company-specific set-up of Industry 4.0 environment and CPPS is characterized by its potential vulnerabilities. This enables companies to evaluate their risk potential before setting up this kind of environments and to undJo,erstand the potential consequences more precisely. By doing so, companies can derive and prioritize important counter-measures and so to strengthen their level of cyber-security efficiently. This will decrease the number of cyber-security attacks and increase the company’s competitiveness.
Networked digitalisation as an enabler for smart products and data-based business models presents companies with numerous and diverse challenges on their way through the digital transformation. Various reference architecture models have been developed in recent years to support these companies. A detailed analysis of these and in particular their use by companies quickly showed that currently existing reference models have major weaknesses in their practical suitability. With the Aachen Digital Architecture Management (ADAM), a framework was developed that specifically addresses the weaknesses of existing reference architectures and specifically takes up their strengths. As a holistic model, specially developed for use by companies, ADAM structures the digital transformation of companies in the areas of digital infrastructure and business development starting from customer requirements. Systematically, companies are enabled to drive the design of the digital architecture, taking into account design fields. The description of the design fields offers a detailed insight into the essential tasks on the way to a digitally networked company. The model is not only a structuring aid, but also contains a construction kit with the design fields to configure the procedure in the digital transformation. The procedure differentiates between the development of the digitalisation strategy and the implementation of the digital architecture. Three different case studies also show how ADAM is used in industry, what structuring support it can provide and how the digital transformation can be configured. The breadth and depth of ADAM enable companies to take the path of digital transformation systematically and in a structured manner, without ignoring the value-creating components of digitalisation. This qualifies ADAM as a sustainability-oriented framework, as it places the economic scaling, needs-based adaptation and future-oriented robustness of solution modules in the focus of digital transformation.
Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und müssen daher entsprechend geschützt werden. Getrieben durch die erhöhte Vernetzung von Informationstechnologie, die höhere Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, rücken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsfähigen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschränken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte für die Bereiche IT-Security, IT-Safety und Datenschutz für vernetzte Produkte, Produktion und Arbeitsplätze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller Überlegungen.
In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, über die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien für die Informationssicherheit festlegen können. (Quelle: https://link.springer.com/chapter/10.1007/978-3-662-63758-6_15)