Hello guest
Your basket is empty
We provide two pathways to the content. Thematic (chapters that address certain themes, e.g. cultivation, regardless of crop or animal type) and Product (chapters that relate to a specific type of crop or animal). Choose the most applicable route to find the right collection for you. 
 
Can’t find what you are looking for? Contact us and let us help you build a custom-made collection. 
You are in: All categories > A-Z Chapters > A
Use the Contact form to discuss the best purchasing method for you... Start building your collection today!

Advances in data security for more effective decision-making in agriculture

Code: 9781786767271
Jason West, University of New England, Australia

Chapter synopsis: There are two types of precision agriculture systems – those that have been hacked, and those that will be. Connectivity and information flow are the two key enabling factors for successful operation of the digital farm. These elements also represent the most vulnerable aspects open to cyber-attack, with the aim of disrupting food production. The use of a principles-based framework to assess cyber-attack vulnerabilities in precision agriculture technology as well as in the environment to which it is applied can greatly mitigate the risk of cyber-attack. From this farmers can construct a precision agriculture system that is appropriately protected from cyber-attacks and matched to the complexity level of the technology without unnecessary cost. Future areas of research include analyses of cyber-attack consequences through modelling cyber-physical system vulnerabilities, detection design and security architecture.

DOI: 10.19103/AS.2020.0069.05
£25.00
Quantity:
Table of contents 1 Introduction 2 Security challenges in PA systems 3 System architecture and legal recourse 4 Security framework considerations for PA systems 5 Modern cyberattack methods 6 Classifying cyberattack source psychology 7 Cybersecurity frameworks for PA 8 Case study: PA system assessment 9 Future trends 10 Conclusion 11 Where to look for further information 12 References 13 Appendix

Also in A

Our site uses cookies. For more information, see our cookie policy. Accept cookies and close
Reject cookies Manage settings