Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/3553
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Murray, I | - |
dc.date.accessioned | 2023-11-13T06:42:12Z | - |
dc.date.available | 2023-11-13T06:42:12Z | - |
dc.date.issued | 2023-03-25 | - |
dc.identifier.issn | 2961 5011 | - |
dc.identifier.uri | https://rda.sliit.lk/handle/123456789/3553 | - |
dc.description.abstract | With the advent of the IoT and its application in industrial settings, there is a significant gap in security policy and implementation as data traverses the traditional Operational Technology (OT) infrastructure and into the IT space. Data gathered in the OT environment now needs to traverse the corporate network to decision makers opening up an array of security and compatibility issues that need to be addressed to keep our critical infrastructure safe. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Sri Lanka Institute of Information Technology | en_US |
dc.relation.ispartofseries | Proceedings of the SLIIT International Conference on Engineering and Technology;Vol. 02 | - |
dc.subject | critical infrastructure | en_US |
dc.subject | IIoT | en_US |
dc.subject | Securing | en_US |
dc.title | Keynote Address-2: Securing critical infrastructure and the IIoT | en_US |
dc.type | Article | en_US |
dc.identifier.doi | https://doi.org/10.54389/IQPV3890 | en_US |
Appears in Collections: | Proceedings of the SLIIT International Conference on Engineering and Technology Vol. 02, 2023 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
keynote 2.pdf | 129.38 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.