{"id":165,"date":"2023-01-16T12:26:43","date_gmt":"2023-01-16T12:26:43","guid":{"rendered":"https:\/\/industria50rm.institutofomentomurcia.es\/technologies-5-0\/cybersecurity\/"},"modified":"2023-10-21T12:09:18","modified_gmt":"2023-10-21T12:09:18","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/technologies-5-0\/cybersecurity\/","title":{"rendered":"CYBERSECURITY"},"content":{"rendered":"\n<div  class=\"content\">\n\n\t\n\t\t\t<div class=\"container\">\n\t\t\t\n\t\t\n\t\t\t\n<div class=\"row gap-col-md gap-row-md mb-xl\">\n\t\n\n<div class=\"col col-12 col-md-12 col-xl-12\">\n\t\n\t\n\t\n\t\n\n<h2 class=\"has-line wp-block-heading\"><span>Brief description of the technology<\/span><\/h2>\n\n\n\t\t<\/div>\n\n\n<div class=\"col col-12 col-md-12 col-xl-6\">\n\t\n\t\n\t\n\t\n\n<p class=\"has-color\">Companies, organizations and entities from all fields (health, finance, education, etc.) use communication networks to collect, process, store and share large amounts of digital information. <strong>As more data is collected and shared, the protection of this information becomes more important to our business. <\/strong><\/p>\n\n\n\t\t<\/div>\n\n\n<div class=\"col col-12 col-md-12 col-xl-6\">\n\t\n\t\n\t\n\t\n\n<p class=\"has-color\">In this context, <strong>cybersecurity is defined as the ability to protect network systems, infrastructures, and data from unauthorized use and potential harm<\/strong> (at the personal, corporate, and state level).<\/p>\n\n\n\n<p class=\"has-color\">To do this, it is necessary to apply a set of technologies including cryptographic techniques, authentication methods, firewalls, virtual private networks, etc.<\/p>\n\n\n\t\t<\/div>\n<\/div>\n\n<div class=\"row gap-col-md gap-row-md\">\n\t\n\n<div class=\"col col-12 col-md-12 col-xl-6\">\n\t\n\t\n\t\n\t\n\n<h2 class=\" mb-xs has-line wp-block-heading\"><span>Benefits of your <br\/>Incorporation into the company<\/span><\/h2>\n\n\n\n<p class=\"has-color size-medium\">Industry 5.0, a highly automated, connected and intelligent industry, now faces increasingly sophisticated cyberspace threats targeting critical infrastructure and the smart devices they employ.<\/p>\n\n\n\n<p class=\"has-color size-medium\"><strong>The cost of suffering a cyberattack can be very high<\/strong>, not only affecting the economy (machine downtime, loss of databases, etc.) but also the company&#8217;s own reputation.<\/p>\n\n\n\t\t<\/div>\n\n\n<div class=\"col col-12 col-md-12 col-xl-6\">\n\t\n\t\n\t\n\t\n\n<h2 class=\" mb-xs has-line wp-block-heading\"><span>Examples of <br\/>Enterprise Application<\/span><\/h2>\n\n\n\n<p class=\"has-color size-medium\"><strong>Attack on<\/strong> a water treatment system: The attack results in the complete downtime of the system, leaving a region without water supply. Specifically, once attackers gain access to the company&#8217;s network, they could reach the company&#8217;s control network and take control of SCADA systems. Thus, if they manage to control a pump and force it to change state (on-off), in the end the pump will break due to incorrect use, resulting in the end leaving a part of the population without supply.<\/p>\n\n\n\n<p class=\"has-color size-medium\"><strong>Stored information hijacking: hijacking the information<\/strong> stored on the servers of a company or administration and encrypting it to make it inaccessible. Once that is done, the cyberattackers ask for a financial ransom in exchange for the cryptographic key that will allow it to be decrypted and made readable again for its owners, threatening to publish or even delete the information they have stolen.<\/p>\n\n\n\t\t<\/div>\n<\/div>\n\t\t\t\n\t\t\n\t\t\t<\/div>\n\t<\/div>\n\n<p class=\"has-color\"><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":155,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"acf":[],"_links":{"self":[{"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/pages\/165"}],"collection":[{"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/comments?post=165"}],"version-history":[{"count":1,"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/pages\/165\/revisions"}],"predecessor-version":[{"id":166,"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/pages\/165\/revisions\/166"}],"up":[{"embeddable":true,"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/pages\/155"}],"wp:attachment":[{"href":"https:\/\/industria50rm.institutofomentomurcia.es\/en\/wp-json\/wp\/v2\/media?parent=165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}