1-Industry 4.0 components-19-07-2024.pptx
Document Details
Uploaded by PreeminentNumber
Tags
Full Transcript
Module - Topics covered Module:1 Fundamentals of Industry 4.0 - 6 hours Industry 4.0 – Introduction to the industrial internet Industry 4.0 components Industry 4. 0 principles Impact of industry 4.0 Designing industr...
Module - Topics covered Module:1 Fundamentals of Industry 4.0 - 6 hours Industry 4.0 – Introduction to the industrial internet Industry 4.0 components Industry 4. 0 principles Impact of industry 4.0 Designing industrial internet systems 1 What is Industry 4.0? Industry 4.0 principles Technological pillars 2 2 Technology Time Line – New Industrial Revolution 3 3 Technology Timeline – New Industrial Revolution 4 4 Technology Timeline – New Industrial Revolution 5 5 What is Industry 4.0? The term originates from a high-tech strategy of the German government -based on a commissioned study in 2008. Concept pointed out by Klauss Schwab executive chair of the world Economy forum - that the term became broadly used. Refers to a further development stage in the organisation and management of the entire value chain process involved in manufacturing industry. Characterize by connectivity and cyber physical systems. Combination of all technologies working together. 6 6 What is Industry 4.0? The change is here. It is not longer enough to produce faster, cheaper and with the higher quality than competitors. Current challenges: Market volatility, shorter product life cycle, higher product complexity It puts the customer in the center of all activities (“Made- for-me” products and services) Mass Customisation, flexible supply chains Leads to an innovation economy Production lines enriched It will enable sustainable prosperity 7 7 Industry 4.0 Important Concepts Cyber-physical systems (CPS) Vertical Integration Horizontal Integration Smart Factory 8 8 Cyber-physical systems (CPS) A cyber-physical system (CPS) is a system of collaborating computational elements controlling Senso r physical entities. CPS are physical and engineered systems whose operations are Cyber- Computi Communication monitored, coordinated, controlled and ng Physical System integrated by a computing and communication core. Actuato r They allow us to add capabilities to physical systems by merging computing and communication with physical systems 9 9 Vertical integration Vertical Integration in Industry 4.0 refers to the connection of processes and business units within an organization. Information technology and Operational technology a particular challenge in Industry 4.0. 10 10 Industry 4.0 Important Concepts Vertical integration Vertical Integration in Industry 4.0 refers to the connection of processes and business units within an organization. Information technology and Operational technology a particular challenge in Industry 4.0. 11 11 Horizontal integration Involves connecting all parts of the supply chain. The horizontal value chain is when Industry 4.0 has the potential to provide the biggest value to manufacture. 12 12 Horizontal integration Involves connecting all parts of the supply chain. The horizontal value chain is when Industry 4.0 has the potential to provide the biggest value to manufacture. 13 13 Smart Factory - Machines with smart capabilities to make smart products with build-in intelligence. - Technologies that would allow the products to self-select production process routes to ensure the most efficient use of the facilities. 14 14 Industry 4.0 - Six Main Principles Organizations will build Industry 4.0 capabilities over time as they integrate the six core design principles: Interoperability Virtualizati on Decentralization Real-Time capability Service Orientation Modularity 15 15 Industry 4.0 - Six Main Principles The ability of all components (cyber-physical systems, humans) to connect, communicate and Interoperabili operate together. ty Collaboration across machines and between humans and machines. Across multiple businesses in the value chain. This is where Industry 4.0 intersects with the industrial Internet of Things. 16 16 Industry 4.0 - Six Main Principles A virtual copy of the Smart sensor data with virtual plant models/ Decentralizati simulation models and on digital twin concept. 17 17 Industry 4.0 - Six Main Principles The ability of cyber-physical systems within Smart Factories to Virtualization make decisions on their own. Autonomous decisions based on possible outcome. 18 18 Industry 4.0 - Six Main Principles The capability to collect and Real time analyze data and provide the insights immediately 19 19 Industry 4.0 - Six Main Principles Offering of services via the Service Internet of Services Orientation 20 20 Industry 4.0 - Six Main Principles Flexible adaptation of Smart Factories for changing Modularity requirements of individual modules. Example: plug & play. 21 21 Elements of Industry 4.0 The need for an enhanced engineering digital environment Origins of Industry 4.0 Horizontal & Vertical Integration Key components of Industry 4.0 Cloud Computing 1 Big Data and support to decision process 10 2 Simulation Internet of Things Interoperability / 9 3 Additive Manufacturing Interconnection Cyber Security Industry Machine Learning Robotics Virtualisation 4.0 Decentralizations Machine Learning 8 4 Simulation Real Time Service Orientation Big Data and support to decision process Additive 7 5 Internet of Modularity Sustainable value enhancement Manufacturing 6 Things (IoT) Cybersecurity Readiness of industry for Industry 4.0 Big Data Augmented Reality Barriers and Challenges Robotics Analytics 22 22 Recommended Videos Pilot Factory for Industry 4.0 https://www.youtube.com/watch?v=XilufLraz9U Factory of the Future 2020 - Valeo (EN) https://www.youtube.com/watch?v=rf4kjXm-C8M Volkswagen - Automated Car Factory of the Future-Jun 2019 https://www.youtube.com/watch?v=8c0Aj8l7Ub0 23 What is the Internet of Things? Devices which have the capability to connect with the internet in any way. A network of physical objects that are embedded with sensors, software, and network connectivity to collect and exchange data. Used in a wide variety of applications, including smart homes, smart cities, and industrial automation. 24 24 Consumer Internet of Things Focuses on the end consumers, notably via smart home & wearables. Use existing wireless protocols such as WiFi, Zigbee, Z-wave or Bluetooth Examples – Smart lighting. Smart locks. Home voice controllers / assistants. Doorbell cams. Smart smoke alarms. Smart watches. Airtags. 25 25 Commercial Internet of Things Focuses on commercial businesses such as shops, offices, hotels. Examples – Shelf labels that display prices and detect stock levels Sensor technology that can hear when the fridge cooling mechanism needs repair, see when to turn the lights off after hours or smell when products start to spoil by detecting the presence of ethylene gas. Smart hotel bathroom mirrors offering a tablet-style experience where guests can watch TV, browse information on hotel services, nearby attractions and local weather, and customize music, lights, and video. Virtual concierge and hotel assistant, able to answer questions and requests from hotel guests that in the past often involved picking up a hotel phone 26 26 Industrial Internet of Things (IIoT) IIoT connects machines and devices in industries such as oil and gas, power generation, and healthcare, where there is more at stake or where system failures and unplanned downtime can result in life-threatening or high-risk situations. Combines sensors, computers, and networks in industrial environments to collect and generate data that is used to monitor, control, and improve processes. Examples – Sensors able to predict equipment health and maintenance needs before they become emergencies and lead to downtime. Remote quality monitoring of machines in hard-to-reach locations Sensors to track individual cargo containers at sea. 27 27 Industrial Internet of Things (IIoT) https://lysi.co/the-internet-of-things-in-manufacturing/ 28 28 What is Cyber Security? “Cyber Security is how individuals and organisations reduce the risk of cyber attack. Cyber security's core function is to protect the devices we use (smartphones, laptops, tablets and computers), and the services we access - both online and at work - from theft or damage. It's also about preventing unauthorised access to the vast amounts of personal information we store on these devices, and online.” (National Cyber Security Centre, 2022) 29 29 How are (I)IoT and Cybersecurity Related? IoT involves machines communicating with each other over the internet, and making decisions independently based on instant information feedback and machine learning. The internet was not built as a commercial entity and therefore does not have inbuilt security. Increased connectivity creates more opportunities for hackers to access organisations. IoT devices often have limited security features, making them easy to hack. Therefore the increased connectivity of IoT (and Industry 4.0) makes Cyber Security essential. 30 30 Types of Cyber Attack Ransomware - Malicious software that makes data or systems unusable until the victim makes a payment. Denial-of-Service (DoS) Attacks - These overload a system, making it unavailable to legitimate users. Phishing - Untargeted, mass emails sent to many people asking for sensitive information (such as bank details) or encouraging them to visit fake website. Spear Phishing – Focussed on specific individuals or organisations. Highly personalised approaches requiring research from the attackers. 31 A Spear Fishing Attack $100 Million Google and Facebook Spear Phishing Scam Perpetrated by Lithuanian national, Evaldas Rimasauskas, who set up a fake company pretending to be a real computer manufacturer that worked with Google and Facebook. Rimsauskas also set up bank accounts in the company’s name. The scammers then sent phishing emails to specific Google and Facebook employees, invoicing them for goods and services that the manufacturer had genuinely provided — but directing them to deposit money into their fraudulent accounts. Between 2013 and 2015, Rimasauskas and his associates cheated the two tech giants out of over $100 million. 32 Types of Cyber Attack cont… Spoofing - Attackers impersonate legitimate entities (e.g., websites, customers) to deceive users. Insider Risks - The potential for damage to be done maliciously or inadvertently by a legitimate user with privileged access to systems, networks or data. IoT-Based Attacks - Targeting vulnerabilities in Internet of Things devices. (National Cyber Security Centre, 2022) 33 IoT-Based Attacks An IoT attack can compromise an entire IoT system, including devices, networks, data, and users. Cybercriminals aim to gain unauthorized access, steal information, or take control of automated systems. Common Threats: Default Passwords: Many IoT devices come with default passwords that users often neglect to change. This widespread knowledge of default passwords makes it easy for attackers to compromise these devices. Unsafe Communication: Messages transmitted by IoT devices over networks are often unencrypted, creating security vulnerabilities 34 An IoT-Based Attack Stuxnet. Targeting a uranium enrichment plant in Natanz, Iran. During the attack, the Siemens Step7 software running on Windows was compromised, giving the worm access to the industrial program logic controllers. This allowed the worm's developers to control different machines at the industrial sites and get access to vital industrial information. Iran hasn't provided detailed information on the attack's results, but the Stuxnet virus is believed to have damaged 984 uranium- enrichment centrifuges. According to estimates, this resulted in a 30% reduction in enrichment efficiency. 35 Examples How one ransomware attack cost £45m to fix - BBC News Here's how car dealerships are coping with cyber attack Cyber Attack: Wannacry Ransomware causing chaos globally - BB C News 36 Cyber Security Actions Make cyber security a high priority at board level Undertake annual cyber risk audits, including consideration of supplier risks. Make it more than an “IT activity” - it needs to involve everyone because for example anyone could click the wrong link in an email. Ensure employees use different passwords of adequate complexity on different systems, especially business critical ones. Ensure devices are maintained with latest software and patches Use 2 factor authentication for emails and other critical systems 37 37 Cyber Security Actions cont… Back up important data and contact information on stand alone storage, to enable the business to continue to operate in the event of an attack Prevent unknown software from being installed – including phone apps Ensure team members and their equipment only have access to the systems required to do their job Train staff. There are various toolkits for employee training on what to look for and what to avoid. Ensure there is a robust firewall in place alongside comprehensive anti-virus software Include cyber attack in the business continuity plan 38 38 Cyber Security Actions 39 39 Consequences of a Cyber Attack Agrafiotis et al (2018) identified five classifications of harm that can result from a cyber attack: 1. Physical/Digital, eg Damaged or unavailable – The asset has been physically or digitally affected to the point where it is not available to fulfil its intended purpose Destroyed – The asset has been physically or digitally ruined Infected – The asset has been physically or digitally contaminated Reduced performance – The asset has had its ability to function lowered 40 40 Consequences of a Cyber Attack 2. Economic, eg – Disrupted operations – The operational assets (e.g. processes) are not functioning as expected – Reduced investments – The investments made by external parties into the organization have dropped – Theft of finances – Finances of the organization have been stolen – Extortion payments – The costs that the organization has had to pay to continue its operations (e.g. after ransom-related incidents) 3. Psychological, eg – Embarrassed – Humiliation experienced by the organization’s stakeholders – Guilty – Regret or remorsefulness experienced by the organization’s stakeholders 41 41 Consequences of a Cyber Attack 4. Reputational, eg – Damaged relationship with customers and / or suppliers – Inability to recruit desired staff – Difficulty to attract and recruit appropriate employees for roles within the organization – Media scrutiny – Media outlets continuously examining the organization 5. Social/societal, eg – Drop in internal organization morale – A reduction in how employees within the organization perceive that organization – Negative changes in public perception – An adverse change in how society generally regards the organization 42 42 Summary Society and businesses increasingly rely on digital systems, software and devices Criminals increasingly look for ways to exploit vulnerabilities. The consequences of a cyber attack can be very damaging, financially, reputationally and in other ways. Cyber security – the tools used to protect devices and data from attack - has therefore become an integral part of business operations. 43