Publication:
Keynote Address-2: Securing critical infrastructure and the IIoT

dc.contributor.authorMurray, I
dc.date.accessioned2023-11-13T06:42:12Z
dc.date.available2023-11-13T06:42:12Z
dc.date.issued2023-03-25
dc.description.abstractWith the advent of the IoT and its application in industrial settings, there is a significant gap in security policy and implementation as data traverses the traditional Operational Technology (OT) infrastructure and into the IT space. Data gathered in the OT environment now needs to traverse the corporate network to decision makers opening up an array of security and compatibility issues that need to be addressed to keep our critical infrastructure safe.en_US
dc.identifier.doihttps://doi.org/10.54389/IQPV3890en_US
dc.identifier.issn2961 5011
dc.identifier.urihttps://rda.sliit.lk/handle/123456789/3553
dc.language.isoenen_US
dc.publisherSri Lanka Institute of Information Technologyen_US
dc.relation.ispartofseriesProceedings of the SLIIT International Conference on Engineering and Technology;Vol. 02
dc.subjectcritical infrastructureen_US
dc.subjectIIoTen_US
dc.subjectSecuringen_US
dc.titleKeynote Address-2: Securing critical infrastructure and the IIoTen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
keynote 2.pdf
Size:
129.38 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: