YaBeSH Engineering and Technology Library

    • Journals
    • PaperQuest
    • YSE Standards
    • YaBeSH
    • Login
    View Item 
    •   YE&T Library
    • ASME
    • Journal of Computing and Information Science in Engineering
    • View Item
    •   YE&T Library
    • ASME
    • Journal of Computing and Information Science in Engineering
    • View Item
    • All Fields
    • Source Title
    • Year
    • Publisher
    • Title
    • Subject
    • Author
    • DOI
    • ISBN
    Advanced Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Archive

    Layered Security Guidance for Data Asset Management in Additive Manufacturing

    Source: Journal of Computing and Information Science in Engineering:;2024:;volume( 024 ):;issue: 007::page 71001-1
    Author:
    Ali Milaat, Fahad
    ,
    Lubell, Joshua
    DOI: 10.1115/1.4064128
    Publisher: The American Society of Mechanical Engineers (ASME)
    Abstract: Manufacturing industries are increasingly adopting additive manufacturing (AM) technologies to produce functional parts in critical systems. However, the inherent complexity of both AM designs and AM processes renders them attractive targets for cyber-attacks. Risk-based information technology (IT) and operational technology (OT) security guidance standards are useful resources for AM security practitioners, but the guidelines they provide are insufficient without additional AM-specific revisions. Therefore, a structured layering approach is needed to efficiently integrate these revisions with preexisting IT and OT security guidance standards. To implement such an approach, this paper proposes leveraging the National Institute of Standards and Technology’s cybersecurity framework (CSF) to develop layered, risk-based guidance for fulfilling specific security outcomes. It begins with an in-depth literature review that reveals the importance of AM data and asset management to risk-based security. Next, this paper adopts the CSF asset identification and management security outcomes as an example for providing AM-specific guidance and identifies the AM geometry and process definitions to aid manufacturers in mapping data flows and documenting processes. Finally, this paper uses the open security controls assessment language (OSCAL) to integrate the AM-specific guidance with existing IT and OT security guidance in a rigorous and traceable manner. This paper’s contribution is to show how a risk-based layered approach enables the authoring, publishing, and management of AM-specific security guidance that is currently lacking. The authors believe implementation of the layered approach would result in value-added, non-redundant security guidance for AM that is consistent with the preexisting guidance.
    • Download: (557.5Kb)
    • Show Full MetaData Hide Full MetaData
    • Get RIS
    • Item Order
    • Go To Publisher
    • Price: 5000 Rial
    • Statistics

      Layered Security Guidance for Data Asset Management in Additive Manufacturing

    URI
    http://yetl.yabesh.ir/yetl1/handle/yetl/4303212
    Collections
    • Journal of Computing and Information Science in Engineering

    Show full item record

    contributor authorAli Milaat, Fahad
    contributor authorLubell, Joshua
    date accessioned2024-12-24T19:03:23Z
    date available2024-12-24T19:03:23Z
    date copyright2/5/2024 12:00:00 AM
    date issued2024
    identifier issn1530-9827
    identifier otherjcise_24_7_071001.pdf
    identifier urihttp://yetl.yabesh.ir/yetl1/handle/yetl/4303212
    description abstractManufacturing industries are increasingly adopting additive manufacturing (AM) technologies to produce functional parts in critical systems. However, the inherent complexity of both AM designs and AM processes renders them attractive targets for cyber-attacks. Risk-based information technology (IT) and operational technology (OT) security guidance standards are useful resources for AM security practitioners, but the guidelines they provide are insufficient without additional AM-specific revisions. Therefore, a structured layering approach is needed to efficiently integrate these revisions with preexisting IT and OT security guidance standards. To implement such an approach, this paper proposes leveraging the National Institute of Standards and Technology’s cybersecurity framework (CSF) to develop layered, risk-based guidance for fulfilling specific security outcomes. It begins with an in-depth literature review that reveals the importance of AM data and asset management to risk-based security. Next, this paper adopts the CSF asset identification and management security outcomes as an example for providing AM-specific guidance and identifies the AM geometry and process definitions to aid manufacturers in mapping data flows and documenting processes. Finally, this paper uses the open security controls assessment language (OSCAL) to integrate the AM-specific guidance with existing IT and OT security guidance in a rigorous and traceable manner. This paper’s contribution is to show how a risk-based layered approach enables the authoring, publishing, and management of AM-specific security guidance that is currently lacking. The authors believe implementation of the layered approach would result in value-added, non-redundant security guidance for AM that is consistent with the preexisting guidance.
    publisherThe American Society of Mechanical Engineers (ASME)
    titleLayered Security Guidance for Data Asset Management in Additive Manufacturing
    typeJournal Paper
    journal volume24
    journal issue7
    journal titleJournal of Computing and Information Science in Engineering
    identifier doi10.1115/1.4064128
    journal fristpage71001-1
    journal lastpage71001-10
    page10
    treeJournal of Computing and Information Science in Engineering:;2024:;volume( 024 ):;issue: 007
    contenttypeFulltext
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian
     
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian