{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

Detecting Abnormal Cyber Behavior Before a Cyberattack

The development of standards-based cyber controls is an important aspect of security requirements for manufacturers

Michael P. Powell
Tue, 04/06/2021 - 12:02
  • Comment
  • RSS

Social Sharing block

  • Print
  • Add new comment
Body

The promise of advanced manufacturing technologies—also known as smart factories or Industry 4.0—is that by networking our machines, computers, sensors, and systems, we will (among other things) enable automation, improve safety, and ultimately become more productive and efficient. And there is no doubt that manufacturing has already benefited from that transformation.

ADVERTISEMENT

However, connecting all of these sensors and devices to our industrial control systems, along with the increase in remote work and monitoring, results in manufacturing networks with greater vulnerabilities to cyberattack. This is an increasingly challenging dynamic as manufacturers sort out how to adopt commercial information technology (IT) standards that are compatible with their operational technology (OT) standards.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Comments

Submitted by Sergey Grigoryev on Mon, 04/05/2021 - 16:23

The use of Shewhart control charts in cybersecurity

The use of Shewhart control charts in cybersecurity

The use of Shewhart control charts in cybersecurity

Dear Michael,

Our software allows you to use Shewhart control charts as a simple and very effective tool in ensuring the cybersecurity of enterprises.

The software uses statistical process control methodology and the power of Microsoft Power Query for Excel:

https://deming.pro/product_shewhart-control-chart-for-excel.html

  • Reply

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us