Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales

In the article, the characteristics of cobots are identified which allow the development of collaborative work with humans, causing industrial processes to be carried out with efficiency, high quality standards, opportunity and cost reduction. On the other hand, vulnerabilities that impact cobots wi...

Full description

Autores:
Benavides Vallejo, Hector Ancizar
Tipo de recurso:
Trabajo de grado de pregrado
Fecha de publicación:
2020
Institución:
Universidad Antonio Nariño
Repositorio:
Repositorio UAN
Idioma:
spa
OAI Identifier:
oai:repositorio.uan.edu.co:123456789/1702
Acceso en línea:
http://repositorio.uan.edu.co/handle/123456789/1702
Palabra clave:
Cobots
Auditoría de sistemas
Controles
Fraudes
Malas prácticas
Cobots
Systems Audit
Controls
Fraud
Bad practices
Rights
openAccess
License
Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
id UAntonioN2_c5ecb36f542c8c6f3eb21a868808be3a
oai_identifier_str oai:repositorio.uan.edu.co:123456789/1702
network_acronym_str UAntonioN2
network_name_str Repositorio UAN
repository_id_str
dc.title.es_ES.fl_str_mv Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
title Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
spellingShingle Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
Cobots
Auditoría de sistemas
Controles
Fraudes
Malas prácticas
Cobots
Systems Audit
Controls
Fraud
Bad practices
title_short Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
title_full Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
title_fullStr Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
title_full_unstemmed Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
title_sort Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
dc.creator.fl_str_mv Benavides Vallejo, Hector Ancizar
dc.contributor.advisor.spa.fl_str_mv Arenas, Hernan Dario
Fuentes, Jenny
dc.contributor.author.spa.fl_str_mv Benavides Vallejo, Hector Ancizar
dc.subject.es_ES.fl_str_mv Cobots
Auditoría de sistemas
Controles
Fraudes
Malas prácticas
topic Cobots
Auditoría de sistemas
Controles
Fraudes
Malas prácticas
Cobots
Systems Audit
Controls
Fraud
Bad practices
dc.subject.keyword.es_ES.fl_str_mv Cobots
Systems Audit
Controls
Fraud
Bad practices
description In the article, the characteristics of cobots are identified which allow the development of collaborative work with humans, causing industrial processes to be carried out with efficiency, high quality standards, opportunity and cost reduction. On the other hand, vulnerabilities that impact cobots with a high-risk severity, in software and hardware are determined through remote and physical attacks, which can manipulate this technology, causing from the theft of classified information to damage in the human resource for injuries. Therefore, the existing controls in the cobots are identified and evaluated, applying the ISO 19011 methodology supported by risk management (ISO 31000), obtaining as a result that the controls are not efficient, nor appropriate to mitigate risks, therefore, It is recommended that systems audits be implemented, such as a detective control, which should be carried out periodically in order to evaluate the state of the controls and in turn analyze whether it is necessary to implement new controls.
publishDate 2020
dc.date.issued.spa.fl_str_mv 2020-06-04
dc.date.accessioned.none.fl_str_mv 2021-02-23T21:46:43Z
dc.date.available.none.fl_str_mv 2021-02-23T21:46:43Z
dc.type.spa.fl_str_mv Trabajo de grado (Pregrado y/o Especialización)
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_7a1f
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
format http://purl.org/coar/resource_type/c_7a1f
dc.identifier.uri.none.fl_str_mv http://repositorio.uan.edu.co/handle/123456789/1702
dc.identifier.bibliographicCitation.spa.fl_str_mv Müller-Abdelrazeq, S., Schönefeld, K., Haberstroh, M., & Hees, F. (2019). Interacting with Collaborative Robots—A Study on Attitudes and Acceptance in Industrial Contexts. Oliver Korn, 101-117.
Apa, L. (22 de 08 de 2017). Ioactive. Obtenido de Ioactive: https://ioactive.com/exploiting-industrial-collaborative-robots/
Chinecherem, O. O., Kenneth, N. C., & Hycient, I. (2017). Robotics and artificial Intelligence: differences and similarities. International journal of computer science and information security, 26-28.
Fast-Berglund, Å., Palmkvist, F., Nyqvist, P., Ekered, S., & Åkerman, M. (2016). Evaluating cobots for final assembly. Elsevier B.V, 175-180.
Hussain, J., Memon, S., Mehmood , S., Usman, M., Ali Khan, R., Abbasi, S., . . . Hussain, Z. (2017). A user friendly security framework for the protectionof confidential information. International Journal of Computer Science and Network Security, 2015-223.
IEC-61508. (2010). Functional safety of electrical/electronic/ (2 ed.). International Electrotechnical Commission.
ISACA. (2018). COBIT2019. Schaumburg: ISACA.
ISO/TS-15066. (2016). Robots and robotic devices — Collaborative robots (1 ed.). Switzerland: International Organization for Standardization.
ISO-10218-1. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 1: Robots (2 ed.). Switzerland: International Organization for Standardization.
ISO-10218-2. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 2: Robot systems and integration. Switzerland: International Organization for Standardization.
ISO-12100. (2010). Safety of machinery — General principles for design — Risk assessment and risk reduction (1 ed.). Switzerland: International Organization for Standardization.
ISO-13849-1. (2015). Safety of machinery — Safety-related parts of control systems — Part 1: General principles for design (3 ed.). Switzerland: International Organization for Standardization.
Kovacs, E. (03 de 05 de 2017). Securityweek. Obtenido de Securityweek: https://www.securityweek.com/industrial-robots-vulnerable-remote-hacker-attacks
Kuka. (23 de 02 de 2018). Kuka. Obtenido de Kuka: https://www.fircroft.com/blogs/cobots-will-play-an-important-role-in-helping-to-fill-the-uks-85423123655
Patil, P. (2016). Artificial intelligence incyber security. International journal of research in computer applications and robotics, 1-5.
Tanenbaum, A. (2012). Redes de computadoras (Quinta ed.). México: Pearson educación. Univelsal-Robots. (11 de 07 de 2018). Univelsal robots. Obtenido de Univelsal robots: https://www.universal-robots.com/about-universal-robots/news-centre/the-history-behind-collaborative-robots-cobots/
Vicentini, F., Ruggeri, M., Dariz, L., Pecora, A., Maiolo, L., Polese, D., . . . Molinari, L. (2014). Wireless sensor networks and safe protocols for user tracking in human-Robot cooperative workspaces. IEEE, 1274-1279.
url http://repositorio.uan.edu.co/handle/123456789/1702
identifier_str_mv Müller-Abdelrazeq, S., Schönefeld, K., Haberstroh, M., & Hees, F. (2019). Interacting with Collaborative Robots—A Study on Attitudes and Acceptance in Industrial Contexts. Oliver Korn, 101-117.
Apa, L. (22 de 08 de 2017). Ioactive. Obtenido de Ioactive: https://ioactive.com/exploiting-industrial-collaborative-robots/
Chinecherem, O. O., Kenneth, N. C., & Hycient, I. (2017). Robotics and artificial Intelligence: differences and similarities. International journal of computer science and information security, 26-28.
Fast-Berglund, Å., Palmkvist, F., Nyqvist, P., Ekered, S., & Åkerman, M. (2016). Evaluating cobots for final assembly. Elsevier B.V, 175-180.
Hussain, J., Memon, S., Mehmood , S., Usman, M., Ali Khan, R., Abbasi, S., . . . Hussain, Z. (2017). A user friendly security framework for the protectionof confidential information. International Journal of Computer Science and Network Security, 2015-223.
IEC-61508. (2010). Functional safety of electrical/electronic/ (2 ed.). International Electrotechnical Commission.
ISACA. (2018). COBIT2019. Schaumburg: ISACA.
ISO/TS-15066. (2016). Robots and robotic devices — Collaborative robots (1 ed.). Switzerland: International Organization for Standardization.
ISO-10218-1. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 1: Robots (2 ed.). Switzerland: International Organization for Standardization.
ISO-10218-2. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 2: Robot systems and integration. Switzerland: International Organization for Standardization.
ISO-12100. (2010). Safety of machinery — General principles for design — Risk assessment and risk reduction (1 ed.). Switzerland: International Organization for Standardization.
ISO-13849-1. (2015). Safety of machinery — Safety-related parts of control systems — Part 1: General principles for design (3 ed.). Switzerland: International Organization for Standardization.
Kovacs, E. (03 de 05 de 2017). Securityweek. Obtenido de Securityweek: https://www.securityweek.com/industrial-robots-vulnerable-remote-hacker-attacks
Kuka. (23 de 02 de 2018). Kuka. Obtenido de Kuka: https://www.fircroft.com/blogs/cobots-will-play-an-important-role-in-helping-to-fill-the-uks-85423123655
Patil, P. (2016). Artificial intelligence incyber security. International journal of research in computer applications and robotics, 1-5.
Tanenbaum, A. (2012). Redes de computadoras (Quinta ed.). México: Pearson educación. Univelsal-Robots. (11 de 07 de 2018). Univelsal robots. Obtenido de Univelsal robots: https://www.universal-robots.com/about-universal-robots/news-centre/the-history-behind-collaborative-robots-cobots/
Vicentini, F., Ruggeri, M., Dariz, L., Pecora, A., Maiolo, L., Polese, D., . . . Molinari, L. (2014). Wireless sensor networks and safe protocols for user tracking in human-Robot cooperative workspaces. IEEE, 1274-1279.
dc.language.iso.spa.fl_str_mv spa
language spa
dc.rights.none.fl_str_mv Acceso abierto
dc.rights.license.spa.fl_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
Acceso abierto
https://creativecommons.org/licenses/by-nc-nd/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.publisher.spa.fl_str_mv Universidad Antonio Nariño
dc.publisher.program.spa.fl_str_mv Especialización en Auditoría de Sistemas (Virtual)
dc.publisher.faculty.spa.fl_str_mv Facultad de Ciencias Económicas y Administrativas
dc.publisher.campus.spa.fl_str_mv Bogotá - Sur
institution Universidad Antonio Nariño
bitstream.url.fl_str_mv https://repositorio.uan.edu.co/bitstreams/21e178a7-11be-46e0-b759-5541638a62b8/download
https://repositorio.uan.edu.co/bitstreams/79825204-bc7a-4ef9-82e2-3aaa6848b3e1/download
https://repositorio.uan.edu.co/bitstreams/864feeac-9923-4a7c-a390-8da44bc88ffa/download
https://repositorio.uan.edu.co/bitstreams/9fef4c0e-7f9a-409d-8e9d-5667b7b12243/download
bitstream.checksum.fl_str_mv 8c03cc96a38c8436105d1df29b9429ba
ba5599f88f244c5cb222ad52ccf52a1e
9868ccc48a14c8d591352b6eaf7f6239
2e388663398085f69421c9e4c5fcf235
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional UAN
repository.mail.fl_str_mv alertas.repositorio@uan.edu.co
_version_ 1812928297848274944
spelling Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)Acceso abiertohttps://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Arenas, Hernan DarioFuentes, JennyBenavides Vallejo, Hector Ancizar2021-02-23T21:46:43Z2021-02-23T21:46:43Z2020-06-04http://repositorio.uan.edu.co/handle/123456789/1702Müller-Abdelrazeq, S., Schönefeld, K., Haberstroh, M., & Hees, F. (2019). Interacting with Collaborative Robots—A Study on Attitudes and Acceptance in Industrial Contexts. Oliver Korn, 101-117.Apa, L. (22 de 08 de 2017). Ioactive. Obtenido de Ioactive: https://ioactive.com/exploiting-industrial-collaborative-robots/Chinecherem, O. O., Kenneth, N. C., & Hycient, I. (2017). Robotics and artificial Intelligence: differences and similarities. International journal of computer science and information security, 26-28.Fast-Berglund, Å., Palmkvist, F., Nyqvist, P., Ekered, S., & Åkerman, M. (2016). Evaluating cobots for final assembly. Elsevier B.V, 175-180.Hussain, J., Memon, S., Mehmood , S., Usman, M., Ali Khan, R., Abbasi, S., . . . Hussain, Z. (2017). A user friendly security framework for the protectionof confidential information. International Journal of Computer Science and Network Security, 2015-223.IEC-61508. (2010). Functional safety of electrical/electronic/ (2 ed.). International Electrotechnical Commission.ISACA. (2018). COBIT2019. Schaumburg: ISACA.ISO/TS-15066. (2016). Robots and robotic devices — Collaborative robots (1 ed.). Switzerland: International Organization for Standardization.ISO-10218-1. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 1: Robots (2 ed.). Switzerland: International Organization for Standardization.ISO-10218-2. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 2: Robot systems and integration. Switzerland: International Organization for Standardization.ISO-12100. (2010). Safety of machinery — General principles for design — Risk assessment and risk reduction (1 ed.). Switzerland: International Organization for Standardization.ISO-13849-1. (2015). Safety of machinery — Safety-related parts of control systems — Part 1: General principles for design (3 ed.). Switzerland: International Organization for Standardization.Kovacs, E. (03 de 05 de 2017). Securityweek. Obtenido de Securityweek: https://www.securityweek.com/industrial-robots-vulnerable-remote-hacker-attacksKuka. (23 de 02 de 2018). Kuka. Obtenido de Kuka: https://www.fircroft.com/blogs/cobots-will-play-an-important-role-in-helping-to-fill-the-uks-85423123655Patil, P. (2016). Artificial intelligence incyber security. International journal of research in computer applications and robotics, 1-5.Tanenbaum, A. (2012). Redes de computadoras (Quinta ed.). México: Pearson educación. Univelsal-Robots. (11 de 07 de 2018). Univelsal robots. Obtenido de Univelsal robots: https://www.universal-robots.com/about-universal-robots/news-centre/the-history-behind-collaborative-robots-cobots/Vicentini, F., Ruggeri, M., Dariz, L., Pecora, A., Maiolo, L., Polese, D., . . . Molinari, L. (2014). Wireless sensor networks and safe protocols for user tracking in human-Robot cooperative workspaces. IEEE, 1274-1279.In the article, the characteristics of cobots are identified which allow the development of collaborative work with humans, causing industrial processes to be carried out with efficiency, high quality standards, opportunity and cost reduction. On the other hand, vulnerabilities that impact cobots with a high-risk severity, in software and hardware are determined through remote and physical attacks, which can manipulate this technology, causing from the theft of classified information to damage in the human resource for injuries. Therefore, the existing controls in the cobots are identified and evaluated, applying the ISO 19011 methodology supported by risk management (ISO 31000), obtaining as a result that the controls are not efficient, nor appropriate to mitigate risks, therefore, It is recommended that systems audits be implemented, such as a detective control, which should be carried out periodically in order to evaluate the state of the controls and in turn analyze whether it is necessary to implement new controls.En el artículo se identifican las características de los cobots las cuales permiten el desarrollo de un trabajo colaborativo con humanos, ocasionando que los procesos industriales se realicen con eficiencia, altos estándares de calidad, oportunidad y reducción de costos. Por otra parte, se determinan las vulnerabilidades que impactan en los cobots con una severidad de riesgo alto, en el software y el hardware a través de ataques remotos y físicos, los cuales pueden manipular esta tecnología, causando desde el robo de información clasificada hasta daños en el recurso humano por lesiones. Por consiguiente se identifican y evalúan los controles existentes en los cobots, aplicando la metodología ISO 19011 apoyada por la gestión de riesgos (ISO 31000), obteniendo como resultado, que los controles no son eficientes, ni apropiados para mitigar los riesgos, por lo tanto, se recomienda que se implementen auditorías de sistemas, como un control detectivo, las cuales deben ejecutarse periódicamente con el objetivo de evaluar el estado de los controles y a su vez analizar si es necesario implementar nuevos controles.Especialista en Auditoría de SistemasEspecializaciónVirtualspaUniversidad Antonio NariñoEspecialización en Auditoría de Sistemas (Virtual)Facultad de Ciencias Económicas y AdministrativasBogotá - SurCobotsAuditoría de sistemasControlesFraudesMalas prácticasCobotsSystems AuditControlsFraudBad practicesAuditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industrialesTrabajo de grado (Pregrado y/o Especialización)http://purl.org/coar/resource_type/c_7a1fhttp://purl.org/coar/version/c_970fb48d4fbd8a85ORIGINAL2020_HectorAncizarBenavidesVallejo2020_HectorAncizarBenavidesVallejoAuditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales.application/pdf745683https://repositorio.uan.edu.co/bitstreams/21e178a7-11be-46e0-b759-5541638a62b8/download8c03cc96a38c8436105d1df29b9429baMD512020_HectorAncizarBenavidesVallejo_Autorización2020_HectorAncizarBenavidesVallejo_AutorizaciónAutorización de Autoresapplication/pdf640638https://repositorio.uan.edu.co/bitstreams/79825204-bc7a-4ef9-82e2-3aaa6848b3e1/downloadba5599f88f244c5cb222ad52ccf52a1eMD54CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8811https://repositorio.uan.edu.co/bitstreams/864feeac-9923-4a7c-a390-8da44bc88ffa/download9868ccc48a14c8d591352b6eaf7f6239MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-82710https://repositorio.uan.edu.co/bitstreams/9fef4c0e-7f9a-409d-8e9d-5667b7b12243/download2e388663398085f69421c9e4c5fcf235MD55123456789/1702oai:repositorio.uan.edu.co:123456789/17022024-10-09 22:35:38.506https://creativecommons.org/licenses/by-nc-nd/4.0/Acceso abiertoopen.accesshttps://repositorio.uan.edu.coRepositorio Institucional UANalertas.repositorio@uan.edu.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