Empowering HVAC Manufacturing with IT/OT Convergence for Operational Excellence
DOI:
https://doi.org/10.32628/CSEIT24245475Keywords:
HVAC, Metadata Management, AI-Based File Management, Natural Language Processing, Machine Learning, Cloud Integration, Document Security, Role-Based Access Control, Anomaly Detection, Encryption, Duplicate Detection, Intelligent Search, Regulatory Compliance, IoT Integration, Predictive Analytics, Blockchain for Document Authentication, Automated Workflow, Secure Data Storage, Audit Logs, Smart File Categorization, DNSAbstract
Information Technology (IT) and Operational Technology (OT) in manufacturing has opened up exciting opportunities for better efficiency and innovation, but it also brings some serious security risks. Since these systems were originally designed separately, they have different priorities and security controls, which can create vulnerabilities. This research looks into automating security audits in these IT/OT blended environments to boost the overall security of manufacturing operations. The goal here is to create systems that automatically check the security of both IT and OT environments, focusing on the unique vulnerabilities that pop up at their intersection. By simplifying how we identify and assess security risks, we’re aiming to close any gaps in communication and interaction between these systems. Plus, the research emphasizes needing automated solutions that quickly fix security weaknesses, helping to reduce the chances of cyber threats taking advantage of these vulnerabilities. This plan includes real-time monitoring, spotting anomalies, and automatic patching to ensure a swift and adaptable reaction to new security challenges. We’re looking to use the latest security automation tools, like those powered by AI and machine learning, to keep security measures fresh and developing as IT and OT systems change. By automating security audits, this work hopes to cut down on human mistakes, make security operations more efficient, and strengthen the defenses of IT/OT integrated environments against increasingly smart cyberattacks, finally offering a scalable approach for securing future manufacturing environments.
Downloads
References
Fnu, Y., Saqib, M., Malhotra, S., Mehta, D., Jangid, J., & Dixit, S. (2021). Thread mitigation in cloud native application Develop- Ment. Webology, 18(6), 10160–10161
Jangid, J., Dixit, S., Malhotra, S., Saqib, M., Yashu, F., & Mehta, D. (2023). Enhancing security and efficiency in wireless mobile networks through blockchain. Journal of Intelligent Systems and Applications in Engineering.
Nessus. Nessus Professional Documentation. Accessed: 2025-03-23. 2021. URL: https : / / www. tenable . com / products/nessus.
Karen Scarfone and Peter Mell. Guide to Vulnerability Assessment. 2007.
Jangid, J., & Malhotra, S. (2022). Optimizing software upgrades in optical transport networks: Challenges and best practices. Nanotechnology Perceptions, 18(2), 194–206. https://nano-ntp.com/index.php/nano/article/view/5169
S. Talwar and A. Mavi. An Overview of DNS Domains/Subdomains Vulnerabilities Scoring Framework. 2023.
S. Talwar and A. Mavi. SECAUTO TOOLKIT - Harnessing Ansible for Advanced Security Automation. 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.