Product Seminars  |  Open Houses  |  Virtual Trade Shows  |  My Account
Induss SoftWerks: Industries Software Werks Company
  CellulicTM Security Systems

The "Cellulic Cybersecurity Technology" is very simply this a cell biomimcry IT system of three subsystems in one. The Learning and Thinking subSystem, the Signal Controller subSystem, and the Data Processor subSystem. The Data Processor interacts with the larger cyber-world, while both the Controller and the Thinking subSystems provide dynamic defensive modalities.

This role of Industrie 4.0 is quite of interest, particularly because one curious process venture has been the augmentation of just regular water valve with IT controller system fitted with limited IT-brain, that supports autonomous operation (as per Industrie 4.0). Of course, there are planned maintenance schedules, set with "Failure finger-printing". However, expanding this autonomous devices design through a collection of process equipment controllers such as in Biological Process Technologies, rapidly evolves the supporting IT onto an abstract IT-Cybernetics(Brain ?). In the analogous maze of complexity associated with collection of autonomous devices rests the rationale of Industrie-4.0 and that is rather curious.

The "Cellulic Cybersecurity Technology" also has the potential for the fundamental architecting of that Cyber-Brain derivative of the Industrie 2.0 Design and Implementation Thinking.This then brings up the matter of the design of the IT infrastructure for this collection of autonomous yet interactive devices such that it interface to the Cyber-security World, the Internet, for the purposes of the extended Enterprise operation is not readily compromised. Agreed this process which is, say, located in German is operating through the UN mechanism which includes friends and foes of Germany, must at design now anticipate the security-breach strategies of the foes and be designed accordingly. Indeed, the consideration then is managing the challenge of existing within the UN mechanism.

These considerations then bring up the subject of decomposing network design into patterns for the purposes of Pattern Analysis, such that every network design could be analyzed in the context of a standard design or hybrid of standard designs from which abstractions of counter-hacking architectures could be designed for proactive defence. In a sense, the collection of network designs prevailing may be reduced to a set of "Fundamental Network Designs" as it were a collection of "chess moves" from which all network designs can be abstracted and therefore subjected to rigorous security analysis; then, of course, that presumes that the cyber-security expert commits to a chess game with hackers: move counter-move.


  Privacy Policy | Terms & Conditions | Site Map | Copyright
Copyright 2001 - , Induss SoftWerks, LLC. All rights reserved
Release version 01-10-00.01.25