{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:23:11Z","timestamp":1768584191746,"version":"3.49.0"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/deed.de"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/deed.de"}],"funder":[{"name":"TU Wien"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Elektrotech. Inftech."],"published-print":{"date-parts":[[2021,11]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>Die Grenzen zwischen Informationstechnologie (IT) und Betriebstechnik (OT) verschwimmen zunehmend, wodurch die Schutzziele Informations- und Datensicherheit (Security) und Betriebssicherheit (Safety) ebenfalls immer st\u00e4rker voneinander abh\u00e4ngen. Beispielsweise k\u00f6nnen Cyber-Angriffe Safety-Funktionen ver\u00e4ndern und dadurch Menschen und die Umgebung gef\u00e4hrden. Umgekehrt kann der Missbrauch einer Safety-Funktion zum Stopp einer Maschine oder Produktionslinie f\u00fchren und so die Verf\u00fcgbarkeit beeintr\u00e4chtigen. Der vorliegende Beitrag besch\u00e4ftigt sich damit, wie verschiedene \u00f6sterreichische Stakeholder der Industrie aktuell mit Security- und Safety-Risiken umgehen, um unerw\u00fcnschte Situationen zu vermeiden oder zu verhindern. Bei dieser Analyse werden sowohl Hersteller von Produkten oder Komponenten als auch Integratoren und Betreiber industrieller Systeme befragt. Es werden dabei die Themengebiete sichere Infrastrukturen und Systemarchitekturen sowie Risikomanagement betrachtet. Die daraus abgeleiteten Ergebnisse bieten Einblicke in den aktuellen Stand beim Umgang mit Safety und Security in der Industrie.<\/jats:p>","DOI":"10.1007\/s00502-021-00930-0","type":"journal-article","created":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T12:02:57Z","timestamp":1631880177000},"page":"449-453","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Safety und Security \u2013 ein Spannungsfeld in der industriellen Praxis","Safety and security \u2013 a field of tension in industrial practice"],"prefix":"10.1007","volume":"138","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3814-6019","authenticated-orcid":false,"given":"Siegfried","family":"Hollerer","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[]},{"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"930_CR1","volume-title":"17th IEEE international conference on factory communication systems (WFCS)","author":"S. Hollerer","year":"2021","unstructured":"Hollerer, S., Kastner, W., Sauter, T. (2021): Towards a threat modeling approach addressing security and safety in OT environments. In 17th IEEE international conference on factory communication systems (WFCS). 4 pp."},{"key":"930_CR2","volume-title":"2007 IEEE conference on emerging technologies and factory automation (EFTA)","author":"T. Novak","year":"2007","unstructured":"Novak, T., Treytl, A., Palensky, P. (2007): Common approach to functional safety and system security in building automation and control systems. In 2007 IEEE conference on emerging technologies and factory automation (EFTA)."},{"key":"930_CR3","unstructured":"Di Pinto, A., Dragoni, Y., Carcano, A. (2018): TRITON: the first ICS cyber attack on safety instrument systems \u2013 understanding the malware, its communications and its OT payload. Black Hat USA"},{"key":"930_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2781198","author":"M. Wolf","year":"2018","unstructured":"Wolf, M., Serpanos, D. (2018): Safety and security in cyber-physical systems and Internet-of-things systems. Proc. IEEE. https:\/\/doi.org\/10.1109\/JPROC.2017.2781198","journal-title":"Proc. IEEE"},{"key":"930_CR5","volume-title":"10th CIRP sponsored conference on digital enterprise technologies","author":"S. Hollerer","year":"2021","unstructured":"Hollerer, S., Fischer, C., Brenner, B., Papa, M., Schlund, S., Kastner, W., Fabini, J., Zseby, T. (2021): Cobot attack: a security assessment exemplified by a specific collaborative robot. In 10th CIRP sponsored conference on digital enterprise technologies."},{"key":"930_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2020.3008136","author":"A. Grau","year":"2021","unstructured":"Grau, A., Indri, M., Bello, L., Sauter, T. (2021): Robots in industry: the past, present, and future of a growing collaboration with humans. IEEE Ind. Electron. Mag. https:\/\/doi.org\/10.1109\/MIE.2020.3008136.","journal-title":"IEEE Ind. Electron. Mag."},{"key":"930_CR7","volume-title":"Industrie 4.0 \u2013 the reference architecture model RAMI 4.0 and the Industrie 4.0 component","author":"R. Heidel","year":"2019","unstructured":"Heidel, R., Hoffmeister, M., Hankel, M., D\u00f6brich, U. (2019): Industrie 4.0 \u2013 the reference architecture model RAMI 4.0 and the Industrie 4.0 component. VDE Verlag, 150 pp."},{"key":"930_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2019.2947119","author":"J. Jasperneite","year":"2020","unstructured":"Jasperneite, J., Sauter, T., Wollschlaeger, M. (2020): Why we need automation models: handling complexity in Industry 4.0 and the Internet of things. IEEE Ind. Electron. Mag. https:\/\/doi.org\/10.1109\/MIE.2019.2947119.","journal-title":"IEEE Ind. Electron. Mag."},{"key":"930_CR9","volume-title":"Hacking exposed industrial control systems: ICS and SCADA security secrets & solutions","author":"C. Bodungen","year":"2016","unstructured":"Bodungen, C., Singer, B., Shbeeb, A., Wilhoit, K., Hilt, S. (2016): Hacking exposed industrial control systems: ICS and SCADA security secrets & solutions. McGraw-Hill Education."}],"container-title":["e &amp; i Elektrotechnik und Informationstechnik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-021-00930-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00502-021-00930-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-021-00930-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T10:14:42Z","timestamp":1636539282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00502-021-00930-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"references-count":9,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["930"],"URL":"https:\/\/doi.org\/10.1007\/s00502-021-00930-0","relation":{},"ISSN":["0932-383X","1613-7620"],"issn-type":[{"value":"0932-383X","type":"print"},{"value":"1613-7620","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"9 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}