Protect your connected devices and networks from cyber attacks
Key Features
Gain practical insights into security concepts in IIoT architecture
Demystify complex topics such as cryptography and blockchain
Learn through comprehensive references to industry standards and security frameworks when developing IIoT blueprints
Book Description
Securing connected industries and autonomous systems is of primary concern to the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security directly ties to system reliability as well as human and environmental safety. This hands-on guide begins by establishing the foundational concepts of IIoT security with the help of real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical knowledge of multi-layered defense techniques, including identity and access management (IAM), endpoint security, and communication infrastructure. You’ll also understand how to secure IIoT lifecycle processes, standardization, and governance. In the concluding chapters, you’ll explore the design and implementation of resilient connected systems with emerging technologies such as blockchain, artificial intelligence, and machine learning. By the end of this book, you’ll be equipped with the all the knowledge required to design industry-standard IoT systems confidently.
What you will learn
Understand the fundamentals of industrial connected devices
Get to grips with multi-layered IIoT security frameworks
Implement a secure industrial architecture
Gain insights into securing identity, access, and configuration management for large-scale IIoT deployments
Secure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivity
Explore case studies on industrial IoT threat modelling and mitigation approaches
Uncover the process of mitigation planning and risk management
Who this book is for
If you’re a security professional, solutions architect, or IoT developers looking to understand and overcome challenges in connected IIoT devices, this book is for you. Some knowledge of IoT development and security is necessary to understand the concepts covered in this book.
Table of Contents
An Unprecedented Opportunity at Stake
Industrial Data Pipeline and Security Architecture