Best Practices for Mitigating Supply Chain Risks in Industrial IoT

Lubna Luxmi Dhirani, Ali Akbar Shah, Qasim Ali, Bhawani Shankar Chowdhry, Abi Waqas, Tanweer Hussain

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The future of a smart manufacturing environment is based on an agile, effective, and efficient supply chain environment. A combination of connected sophisticated technologies deployed for enabling the supply chain widens the emerging threat surface. The existing security strategy used in production exposes the environment to several risks due to a lack of digital forensics, identity, and access management controls, outdated operating systems, patch management, and issues related to securely connecting legacy Industrial Control Systems using novel communication methods. To mitigate these issues a coordinated framework for cyber resilience provisioning is required to ensure trusted supply chains in Industry 5.0. Data security and privacy aspects play a vital role in mitigating supply chain risks and designing mitigation strategies as they provide insights on essential security metrics (i.e., risk and vulnerability management, accountability, evidence-based security assurance, etc.). This chapter deep dives into the Industrial IoT (IIoT) supply chain threat landscape, discusses the feasibility and efficacy of existing solutions, and articulates the literary trends surrounding opportunities and risks in cybersecurity for IIoT.
Original languageEnglish (Ireland)
Title of host publicationBest Practices for Mitigating Supply Chain Risks in Industrial IoT
Subtitle of host publicationPolicies and Practices
PublisherTaylor and Francis-CRC Press
Pages183-198
Number of pages16
ISBN (Electronic)9781003376620
ISBN (Print)9781032444659
DOIs
Publication statusPublished - 2024

Keywords

  • industry 5.0
  • cybersecurity
  • supply chain
  • IT/OT
  • risk
  • standards
  • privacy

Fingerprint

Dive into the research topics of 'Best Practices for Mitigating Supply Chain Risks in Industrial IoT'. Together they form a unique fingerprint.

Cite this