Technological progress offers opportunities for introducing new business models but also opens new paths for attackers. Security-by-design integrates factory security from the start and introduces a continuous security process built upon a variety of components. This article illustrates some of these components by highlighting secure processes with specific case studies: anomaly detection within value networks and secure production planning with simulation.
You are currently not logged in / not yet registered.
In order to download the desired file(s), you must be logged in and have an appropriate inclusive subscription. Alternatively, you can also obtain access by paying a one-off fee.