With increasing global reliance on the Internet as a medium, to make transactions and transmit information comes with an increased risk of cyber-attacks. Today‟s Internet is using by various societies of all available sectors. It is implemented by rapid changes in computing technology and expanded internet prevalence. But in opposite of this, malicious activities are growing rapidly and the technique to protect internet is becoming very critical. Every country‟s cyber infrastructure is interconnected with and instrumental to economic prosperity and national security. However, most of the cyberinfrastructures are not secure and are vulnerable to severe attacks. Several malicious actors potentially leading to failure of critical infrastructure, exploitation of sensitive information, and loss of intellectual property (for e.g. US White House 2009, US Senate 2010, and Iran 2010 etc.). This paper introduces the idea of cyber physical system (CPS). Cyber-Physical Systems are integration of computation and physical processes. A cyber-physical system is a system of collaborating computational elements controlling physical entities. Today‟s benefits of virtualization technology are that can obtain high resource utilization through dynamic sharing of physical resources. Today‟s this virtualization technology has become a key technology for the next generation computing which can easily get information technology (IT) infrastructure anytime, anywhere and expand. This work introduces various essentials opportunities and future challenges to improve cyber security and building a CPS system more secure and powerful.
[1]
Kumar Amit,et al.
A Wide Scale Survey on Botnet
,
2011
.
[2]
Alvaro A. Cárdenas,et al.
Attacks against process control systems: risk assessment, detection, and response
,
2011,
ASIACCS '11.
[3]
Amit Kumar Tyagi,et al.
An Efficient Cyber-Physical Systems for Mobile Environments: a dynamic integration middleware perspective
,
2014
.
[4]
Bruno Sinopoli,et al.
Challenges for Securing Cyber Physical Systems
,
2009
.
[5]
Siu-Ming Yiu,et al.
Security Issues and Challenges for Cyber Physical System
,
2010,
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[6]
Florian Dörfler,et al.
Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design
,
2012,
ArXiv.
[7]
Hasan Cam,et al.
Mission assurance policy and risk management in cybersecurity
,
2013,
Environment Systems and Decisions.
[8]
Tripti Lamba,et al.
A Study of Cyber Security in Web Environment
,
2014
.