-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreport-manufacturing.html
123 lines (112 loc) · 6.33 KB
/
report-manufacturing.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta charset="utf-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=edge"/>
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<meta name="description"
content="T-800 Cybersecurity performs security research in the manufacturing of electronics which requires a high degree of security to provide safety to customers."/>
<title>Manufacturing | T-800 Cybersecurity</title>
<link rel="stylesheet" href="style.css"/>
<link rel="stylesheet" media="screen" href="https://fontlibrary.org//face/acari-sans-neue" type="text/css"/>
<meta name="theme-color" content="#ffffff"/>
<link rel="icon" href="./Images/LOGO.svg"/>
<link rel="mask-icon" href="./Images/LOGO.svg" color="#000000"/>
<link rel="apple-touch-icon" href="favicon.png"/>
</head>
<body>
<header>
<nav class="container">
<div class="grid">
<a id="logo" title="homepage" href="./index.html"><img class="item" alt="t-800 cybersecurity logo"
src="./Images/LOGO+Name.svg" width="1000" height="305"/></a>
<form id="form" class="item">
<label for="query">Search for a topic</label><br/><input type="search" id="query" name="q"
placeholder=" Search..."/>
<a href="#" title="search" class="button">Go!</a>
</form>
<a class="item center" title="homepage" href="index.html">Home</a>
<a class="item center" title="services" href="services.html">Services</a>
<a class="item center" title="products" href="products.html">Products</a>
<a class="active item center" title="publications" href="publications.html">Publications</a>
<a class="item center" title="blog" href="blog.html">Blog</a>
<a class="item center" title="about us" href="about-us.html">About Us</a>
</div>
<div>
<a title="home" href="index.html">Home</a>
>
<a title="publications" href="publications.html">Publications</a>
>
<a title="manufacturing" href="report-manufacturing.html">Manufacturing</a>
</div>
</nav>
</header>
<main>
<section>
<div class="content">
<h1>Manufacturing</h1>
<div class="imagespacer" style="background-image: url('./Images/server_400x266.jpg')"></div>
<div class="content">
<span class="content credit">Credit: <a title="credit"
href="https://www.flickr.com/people/8718930@N07/">https://www.flickr.com/people/8718930@N07/ </a></span>
</div>
<p>
The term “cyber security” in manufacturing refers to the security of data and information related to the
manufacturing process.
This can include everything from the design and engineering of products to the manufacturing process
itself and even the finished
products. In today’s interconnected world, where businesses and individuals rely heavily on technology,
it’s more important than
ever to ensure that data and information related to manufacturing is secure.
</p>
<p>
There are a number of cyber security threats that manufacturing companies need to be aware of. One of
the most common is cyber
espionage, which is when someone tries to gain unauthorized access to a company’s data in order to steal
trade secrets or other
sensitive information. This can be done through a variety of means, such as hacking into a company’s
computer systems or using
social engineering to trick employees into giving up login credentials.
</p>
<p>
Another common threat is ransomware, which is when a malicious actor encrypts a company’s data and then
demands a ransom be paid
in order to decrypt it. This can be extremely costly for a company, not to mention disruptive to the
manufacturing process.
</p>
<p>
Finally, another threat that is particularly relevant to manufacturing is industrial espionage, which is
when someone tries
to steal information or trade secrets in order to gain a competitive advantage. This can be done through
a variety of means, such
as hacking into a company’s systems, social engineering, or even physical theft.
</p>
<p>
There are a number of steps that manufacturing companies can take to protect themselves from cyber
security threats. These
include implementing strong security measures, such as firewalls and intrusion detection systems, as
well as training employees
on how to spot and avoid phishing attacks. Additionally, companies should have a incident response plan
in place in case of a breach.
</p>
<p>
Ultimately, cyber security in manufacturing is a critical issue that companies need to be aware of. By
taking steps to protect
themselves, they can help ensure that their data and information is safe from malicious actors.
</p>
<a title="download" class="button" href="#">Download report</a>
</div>
</section>
</main>
<footer>
<div class="imglist">
<span>@Copyright 2023 by T-800 Cybersecurity. All rights reserved.</span>
<a title="share" href="#"><img class="icon" src="./Images/share.png" alt="share option"/></a>
<a title="whatsapp" href="#"><img class="icon" src="./Images/whatsapp.png" alt="share on whatsapp"/></a>
<a title="linkedin" href="#"><img class="icon" src="./Images/linkedin.png" alt="share on linkedin"/></a>
<a title="twitter" href="#"><img class="icon" src="./Images/twitter.png" alt="share on twitter"/></a>
<a title="facebook" href="#"><img class="icon" src="./Images/facebook.png" alt="share on facebook"/></a>
</div>
</footer>
</body>
</html>