Difference between revisions of "Digital Twin"

From MgmtWiki
Jump to: navigation, search
(Context)
(Solutions)
Line 7: Line 7:
  
 
==Solutions==
 
==Solutions==
 +
How Digital Twins Could Protect Manufacturers from Cyberattacks<ref>NIST ''How Digital Twins Could Protect Manufacturers from Cyberattacks'' NIST News (2023-02-23) https://hbr.org/1998/07/how-hardwired-is-human-behavior</ref>
 +
<blockquote>At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.</blockquote>
  
 
==Reference==
 
==Reference==
  
 
[[Category: Glossary]]
 
[[Category: Glossary]]

Revision as of 18:44, 1 March 2023

Full Title or Meme

A computer model of a real-world object for purposes of prediction or explaination of the actions of real-world object.

Context

  • The concept of Digital Twin was created as an avatar that could be used as a model for one particular Entity’s behavior.
  • It can also be used as an agent used to perform actions for a human operating independently in the digital regime.

Solutions

How Digital Twins Could Protect Manufacturers from Cyberattacks[1]

At the U.S. National Institute of Standards and Technology and the University of Michigan, researchers have combined digital twin technology, machine learning, and human expertise into a cybersecurity framework for manufacturers. The researchers constructed a digital twin to mimic a three-dimensional (3D)-printing process, supplemented with information from a real 3D printer. Pattern-recognizing models monitored and analyzed continuous data streams computed by the digital twin as the printer created a part, then the researchers introduced various anomalies. The programs handed each detected irregularity to another computer model to check against known issues, for classification as expected anomalies or potential cyberthreats; a human expert made the final determination. The team found the framework could correctly differentiate cyberattacks from normal anomalies.

Reference

  1. NIST How Digital Twins Could Protect Manufacturers from Cyberattacks NIST News (2023-02-23) https://hbr.org/1998/07/how-hardwired-is-human-behavior