Understanding Industry 4 V007a
Understanding Industry 4 V007a
y Dr. Gustavo A.
la Transformación Santana Torrellas
Digital
Gustavo Santana
Matemático con amplia experiencia
en Cyberseguridad y desarrollo de Gustavo Santana ha participado en
Modelos Matemáticos en Sistemas Los antecedentes de Gustavo son proyectos de Estrategia de TI, Desarrollo
Administrativos y Tecnológicos. Su de modelos y soluciones de
investigación abarca muchas tan multidimensionales como las Administración de Riesgos de
disciplinas relacionadas y ha visiones que él ayuda a crear. Información y Riesgo Tecnológico con
publicado mas de 120 artículos de énfasis en cumplimiento de estándares.
investigación.
What is Digital
Transformation?
Digital
transformation
is the
integration of
digital
technology into
all areas of a
business,…
Digital transformation is…, fundamentally changing how
you operate and deliver value to customers
What is Digital
transformation?
Digital Transformation = Business Transformation
17
Digital
Transformation
Taxonomy
Procedural
pattern map for
Digital
Transformation
Value Generation
The two dimensión of Digital
Transformation
Digital
Transformation
as a combination
of Digital
Governance +
Digital
Infrastructure +
Digital Economy
The four Tiers of
Digital
Transformation
Digital Transformation Pillars
Market forces
that drive
digitalization
The framework is a tool, used across an organization, that guides all levels
of the organization through the journey
What’s all the
hype about?
the Gartner Hype Cycle?
Have you wondered what it’s all about and whether
it can help you?
It is published annually, so it is not something you need
to look at very often, but each year there are new and
interesting entrants on the Cycle while others make
progress along it.
It is worth mentioning that there are different versions
for different audiences,…
Hype Cycle Digital
Transformation
How to start your
Digital
Transformation
Journey
Digital
Disruption
”Industry 4.0”
Different
technologies
for different
types of
innovations
Data is the key
concept
... impact of
digitalization in all
areas and sectors
Pyramid of
Digital
Transformation
and
Industry 4.0
Industry 4.0:
Cybersecurity
and Smart Data
Curren state of
Industry 4.0
Industry 4.0
Industry 5.0
industry 6.0
Industry 4.0
Industry 5.0
industry 6.0
…and beyond!!!
From Industry 4.0 to Industry 6.0
…and beyond
How we get to
Digital
Transformation?
Future
computing
scenarios
Vision and
key features of
Computing
2030
Internet
evolution:
Histografía
Services and
principal
milestones
Internet
evolution:
Histografia
Cloud Computing
Evolution of
IT towards
Cloud
Computing
What Is Cloud Computing?
Cloud computing
relies on sharing of
resources to
achieve coherence
and economies of
scale
(Business Model)
Proponents also claim that cloud computing allows
enterprises to get their applications
up and running faster,
with improved manageability and
less maintenance,
and that it enables IT teams to more rapidly adjust
resources to meet fluctuating and unpredictable
demand, providing the burst computing capability: high
computing power at certain periods of peak demand
Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for:
centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
peak-load capacity increases (users need not engineer and pay for the resources and equipment to
meet their highest possible load-levels)
utilisation and efficiency improvements for systems that are often only 10–20% utilised.
key design
considerations
for a multi-tenant
cloud
Cloud computing
exhibits the following
key characteristics:
Productivity may be increased when multiple users can work on the same data
simultaneously, rather than waiting for it to be saved and emailed. Time may be saved as
information does not need to be re-entered when fields are matched, nor do users need to
install application software upgrades to their computer.
Cloud computing
Availability improves with the use of multiple redundant sites, which makes well-
designed cloud computing suitable for business continuity and disaster recovery.
exhibits the
following key
characteristics:
Cloud computing
exhibits the following
key characteristics:
Scalability and elasticity via dynamic ("on-
demand") provisioning of resources on a fine-grained, self-
service basis in near real-time (Note, the VM startup time varies by
VM type, location, OS and cloud providers), without users having
to engineer for peak loads.
This gives the ability to scale up when the usage need increases
or down if resources are not being used.
Emerging approaches for managing elasticity include the use of
machine learning techniques to propose efficient elasticity
models.
Cloud computing Security can improve due to
exhibits the centralization of data, increased security-
focused resources, etc., but concerns can
following key persist about loss of control over certain
An error inside a virtual machine does not harm the host system, so there is no risk of the OS crashing
on the laptop.
Because of this ease of relocation, virtual machines can be readily used in disaster recovery scenarios
without concerns with impact of refurbished and faulty energy sources.
Service-oriented
architecture -
SOA
Autonomy-oriented computation is a
paradigm proposed by Jiming Liu in 2001 that
uses artificial systems imitating social animals'
collective behaviours to solve difficult
computational problems.
For example, ant colony optimization could be
studied in this paradigm.
Autonomic
computing The AC system concept is
designed to make adaptive
decisions, using high-level policies
It will constantly check and optimize
its status and automatically adapt
itself to changing conditions
Autonomic
computing
An AC can be modeled in terms of:
• two main control schemes (local and global)
with sensors (for self-monitoring),
• effectors (for self-adjustment),
• knowledge and planner/adapter for exploiting
policies based on self- and environment awareness
This architecture is sometimes referred to as Monitor-
Analyze-Plan-Execute (MAPE)
Autonomic Computing-Layered
Approach
An autonomic
computing
framework is
composed of
autonomic comp
onents (AC)
interacting with
each other
Driven by such vision, a variety of architectural
frameworks based on "self-regulating" autonomic
computation,
Utility is the packaging
storage and
of system resources, such
Utility as: services, as a metered
service.
computing
The Relationship
Between Edge
and Cloud
The distributed nature
of edge computing Processing of data starts at its source
means that along with
reducing latency, it also Once initial processing is completed, only the data that needs further
improves resiliency, analysis or requires other services needs to be sent
reduces networking
load, and is easier to This reduces networking requirements and the potential for bottlenecks at
scale any centralized services
with other nearby edge locations, or the potential of caching data on the
device, you can mask outages and improve your system’s resiliency
This reduces the need to scale your centralized services since they are
handling less traffic
The results can also reduce costs, architecture complexity, and management
Evolving
Computing
Paradigms:
Cloud, Edge,
and Fog
Technologies
Big data & big data security
Simple to start
Big Data refers to data sets with size beyond the ability of the typical Today organizations capture and store an ever increasing amount of
BI tools and techniques to capture, store, analyze and manage. data.
The definition is still evolving and can vary by industry sector. Internet availability, interconnectedness, connection speed and
Currently it is intentionally subjective without ties to a specific mobility contribute to a torrent of data points being generated
storage size. daily.
Today big data in many sectors can range from several terabytes to Organizations realize the potential value of these extreme-sized data
petabytes of storage. sets and discard less and less information (customer data or
internal)
The underlying enabling technology (Hadoop & MapReduce)
relies heavily on distributed processing. However, the existing means to process, and analyze data cannot
scale to extreme sizes economically.
Big Data
security
Big Data
security
analytics
Big Data
security
analytics
Big Data
security
analytics
Challenges
To capture Full Potential of Big Data several moving
Key Challenges have To Be overcome forward
• Ownership of, and access • Big Data still in early • Traditional SDLC models • Technology still evolving.
to data. stages – There might be might not work. • Analytical theory to
• Traditional compliance organizational chart • Industry sectors not yet support big data not
and security tools might changes required. ready infrastructure-wise. mature.
not fit. • Shortage of specialized • Politics and industry
• Extreme-size data sets analytical skills . leaders buy in.
will have to reside in • New business model
cloud storage to leverage might be required.
its flexibility and
distributedness.
Security Intelligence
computer
new I/O user interfaces
networks
Confidentiality:
Considering the 4G-LTE and 5G architectures, any user plane data must be
confidential and protected from unauthorized users [73].
Standard data encryption algorithms have been widely adopted to realize the
Confidentiality: data confidentiality in 5G network applications (e.g., vehicle network [74],
health monitoring [75] etc).
The symmetric key encryption algorithm can be utilized to encrypt and
decrypt 5G data with one private key.
This is shared between the communicating entities (e.g., a sender and a
receiver).
This is to prevent tempering and loss of information during transformation from one
point to another.
Integrity:
Integrity of 5G New Radio (NR) traffic is protected similar to 4G.
In 5G NR, the integrity protected of wireless data traffic at the Packet Data Convergence
Protocol (PDCP) layer.
In 4G LTE integrity protection is provided only for Non-Access Stratum (NAS) and
Access Stratum (AS) [82].
Integrity: However, One main of key advancement in 5G integrity protection entails that 5G NR
offers the integrity protection of the user plane as well.
This is significant because 4G did not support the integrity protection of the user plane.
This new feature is useful for small data transmissions, particularly for constrained IoT
devices.
Moreover, 5G authentication mechanism 5G-AKA is using integrity-protected signaling.
This ensures that no unauthorized party can modify or access the information that is
communicated over the air [83].
In 5G domain, networks availability is to ensure that the network resources can be
accessible whenever they are needed by legitimate users, since the availability effects
on the reputation of service provider.
Availability:
In another words, the availability ensures the high probability effectiveness
of network infrastructure. It also measures the sustainability of a network
against active attacks, e.g., DoS attack.
Visibility:
This can efficiently tackle the basic network issues to ensure a secure environment.
The 5G networks need to utilize comprehensive end-to-end security strategies, which
should cover all layers of the network including application, signaling and data planes.
To implement such comprehensive security mechanism, 5G operators should have a
complete visibility, inspection and controls over all layers in the network.
Visibility: Here, the 5G technologies should be integrated with open APIs to manage with the
security policies.
In such a way, 5G network can have consistent security polices of both software and
hardware in the network.
The enhanced visibility across the network and security policies will help to implement
contextual security mechanisms which is suitable for new 5G services.
Moreover, enhance visibility enables data-driven threat prevention to find and isolate the
infected devices before attacks can potentially take place.
Artificial
Intelligence &
Industry 4.0
A medida que más empresas se centran en las Los ciber riesgos y
principales transformaciones digitales amenazas se
impulsadas por IA,... incrementan
Why
Machine
Learning
AI for Cyber Security:
¿Cómo la IA previene ciberataques?
En esta sección se echa un vistazo a cómo medidas en cyber analytics y artificial
intelligence permite que los equipos de ciberseguridad evalúen y analicen de
antemano el próximo movimiento de un ataque/enemigo evasivo.
CYBERTHREAT
S
First, let’s talk about
some common cyber
safety threats and the
problems they can
cause.
5 Digital Security threats that machine
learning can protect against
What is
blockchain?
You can think of a ledger like a record book: it
records and stores all transactions between users
in chronological order.
Different types of
blockchain
Public blockchains (like Bitcoin) are open for
anyone to read and view,
Different types of
Permissioned blockchains permit just a select
blockchain group of users to write (i.e. generate transactions
for the ledger to record) and commit (i.e. verify
new blocks for addition to the chain).
Risk appetite vs
Risk Tolerance
WHAT IS THE How can we expect risks to be identified and
OPTIMAL measured in the future?