The article is based on practical experience and research, presenting the author's concept of applying the principles of cybersecurity of IT/OT systems in key functional areas of a mining plant operating based on the idea of INDUSTRY 4.0.In recent years, cyberspace has become a new security environment, which has introduced significant changes in both the practical, and legal and organizational aspects of the operation of global security systems. In this context, it is particularly important to understand the dynamics of this environmental change (both in the provisions of the NIS 2 directive and the KSC Act) [1]. Building a legal system as a national response to the opportunities and challenges related to its presence in cyberspace was an extremely complex task. This results not only from the pace of technological change, but also from the specificity of the environment and its "interactivity". The trend in international law that has emerged during COVID-19 and the current geopolitical situation is to treat organizations from the mining and energy sector as one of the important actors in national and international relations [2].The new regulations introduce and expand international cooperation between individual entities and regulate security strategies and policies, which should take into account the recommendations of the Ministry of Climate and Environment, with particular emphasis on, among others, ensuring the continuity of system operation, handling security incidents and constantly increasing awareness of cybersecurity and cyber threats. It should not be forgotten that threats in cyberspace represent a different class of organizational challenges, largely similar to those posed by other asymmetric threats such as terrorism. Their common feature is that they require less hierarchical and more flexible solutions on state structures. Cybersecurity, both socially and technologically, with all its consequences, emerges as one of the most important concepts of the security paradigm at the national and international level [3].
2
Dostęp do pełnego tekstu na zewnętrznej witrynie WWW
The article presents a survey on IT/OT security threats related to malicious software. The review relates to the threats along with their evolution over time as well as means to mitigate them. Not only theoretic approach has been presented, but solutions available on the market and best practices as well. The paper also considers the security of IT/OT systems interconnection.
PL
W artykule zaprezentowano przegląd zagrożeń bezpieczeństwa IT/OT związanego ze złośliwym oprogramowaniem. Scharakteryzowano zarówno zagrożenia, w szczególności ich ewolucję, jak i sposoby ich zwalczania. Zaprezentowano nie tylko teoretyczne ujęcie zagadnienia, ale także rozwiązania dostępne na rynku i dobre praktyki. Odniesiono się również do zabezpieczania styku systemów IT/OT.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.