Have a personal or library account? Click to login
Practical Industrial Internet of Things Security Cover

Practical Industrial Internet of Things Security

A practitioner's guide to securing connected industries

Paid access
|Aug 2018

Protect your connected devices and networks from cyber attacks

Key Features

  • Gain practical insights into security concepts in IIoT architecture
  • Demystify complex topics such as cryptography and blockchain
  • Learn through comprehensive references to industry standards and security frameworks when developing IIoT blueprints

Book Description

Securing connected industries and autonomous systems is of primary concern to the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security directly ties to system reliability as well as human and environmental safety.
This hands-on guide begins by establishing the foundational concepts of IIoT security with the help of real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical knowledge of multi-layered defense techniques, including identity and access management (IAM), endpoint security, and communication infrastructure. You’ll also understand how to secure IIoT lifecycle processes, standardization, and governance. In the concluding chapters, you’ll explore the design and implementation of resilient connected systems with emerging technologies such as blockchain, artificial intelligence, and machine learning.
By the end of this book, you’ll be equipped with the all the knowledge required to design industry-standard IoT systems confidently.

What you will learn

  • Understand the fundamentals of industrial connected devices
  • Get to grips with multi-layered IIoT security frameworks
  • Implement a secure industrial architecture
  • Gain insights into securing identity, access, and configuration management for large-scale IIoT deployments
  • Secure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivity
  • Explore case studies on industrial IoT threat modelling and mitigation approaches
  • Uncover the process of mitigation planning and risk management

Who this book is for

If you’re a security professional, solutions architect, or IoT developers looking to understand and overcome challenges in connected IIoT devices, this book is for you. Some knowledge of IoT development and security is necessary to understand the concepts covered in this book.

Table of Contents

  1. An Unprecedented Opportunity at Stake
  2. Industrial Data Pipeline and Security Architecture
  3. IIoT Identity and Access Management
  4. Endpoint Security and Trustworthiness
  5. Securing Connectivity and Communications
  6. Securing IIoT Edge, Cloud and Apps
  7. Secure Processes and Governance
  8. IIoT Security using Emerging Technologies
  9. IIoT Security: Real World Case Studies
  10. The Road Ahead
  11. Appendix I
  12. Appendix II
PDF ISBN: 978-1-78883-085-0
Publisher: Packt Publishing Limited
Copyright owner: © 2018 Packt Publishing Limited
Publication date: 2018
Language: English
Pages: 324

People also read