This HTML5 document contains 30 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
n20https://kar.kent.ac.uk/84285/
wdrshttp://www.w3.org/2007/05/powder-s#
n16http://purl.org/ontology/bibo/status/
dchttp://purl.org/dc/elements/1.1/
n18https://kar.kent.ac.uk/id/subject/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n7https://kar.kent.ac.uk/id/eprint/84285#
n21https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n15doi:10.1109/
n3http://eprints.org/ontology/
n17https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n11https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n4https://kar.kent.ac.uk/id/document/
n9https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n13https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n10https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:84285
rdf:type
n3:ConferenceItemEPrint n3:EPrint bibo:AcademicArticle bibo:Article
rdfs:seeAlso
n20:
owl:sameAs
n15:CSCI51800.2020.00018
n3:hasAccepted
n4:3221367
n3:hasDocument
n4:3221389 n4:3221430 n4:3221431 n4:3221432 n4:3221433 n4:3221367
dc:hasVersion
n4:3221367
dcterms:title
A Cyber-Security Strategy for Internationally-dispersed Industrial Networks
wdrs:describedby
n13:export_kar_RDFN3.n3 n21:export_kar_RDFN3.n3
dcterms:date
2021-06-23
dcterms:creator
n10:ext-antonio.lemosmaia@vale.com n10:ext-alexandre.gonzalez@vale.com n10:ext-ralf.moura@vale.com n10:ext-v.franqueira@kent.ac.uk
bibo:status
n16:peerReviewed n16:published
dcterms:publisher
n11:ext-af0a9a5baed87c407844a3f5db44597c
bibo:abstract
Globalization implies geographically dispersed supply chains composed of facilities strategically located in several countries and regions of the world. These structures commonly involve several Operational Technology (OT) and Information Technology (IT) infrastructures and integration to enable accurate and useful information processing. Such integration (also called Cyber-Physical Systems) transforms the industry and facilitates massive data volumes' systematic transformation into valuable information. Security risks posed by such integration may be substantial and, depending on the size of the company, and the number of integration points, dealing with them could easily cost millions of dollars. With the main objective of studying available strategies to manage security risks in companies with dispersed supply chains, this paper reviews international cyber-security standards and regulations and proposes a more comprehensive strategy. The strategy includes IT services, optimized perimeter segregation, and data flow policies among OT and IT networks to balance a high level of protection and cost-effectiveness.
dcterms:isPartOf
n9:repository
dcterms:subject
n18:QA75
bibo:authorList
n7:authors
bibo:presentedAt
n17:ext-6acfa1dd8bdda141585f840397a725bc