Page 28 - SEE40-Implementation-paper_EN
P. 28

Data security






                                             Access
                                                             Information
                                                             Technology




                            Threat



                                                               Threat                   Intellectual
                                                              Feedback
                                                                                         Property

                            Unwitting
                            Employee



                                                             Operational
                                                             Technology
                                             Access

                              Threat            (*) Graphic based on “Industry 4.0 and the Escalation of Cyber-
                                                                                                            28
                                                Physical Vulnerabilities”, by Bruce Sussman.
   23   24   25   26   27   28   29   30   31   32   33