Protect your connected devices and networks from cyber attacks
Key Features
- Gain practical insights into security concepts in IIoT architecture
- Demystify complex topics such as cryptography and blockchain
- Learn through comprehensive references to industry standards and security frameworks when developing IIoT blueprints
Book Description
Securing connected industries and autonomous systems is of primary concern to the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security directly ties to system reliability as well as human and environmental safety.
This hands-on guide begins by establishing the foundational concepts of IIoT security with the help of real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical knowledge of multi-layered defense techniques, including identity and access management (IAM), endpoint security, and communication infrastructure. You’ll also understand how to secure IIoT lifecycle processes, standardization, and governance. In the concluding chapters, you’ll explore the design and implementation of resilient connected systems with emerging technologies such as blockchain, artificial intelligence, and machine learning.
By the end of this book, you’ll be equipped with the all the knowledge required to design industry-standard IoT systems confidently.What you will learn
- Understand the fundamentals of industrial connected devices
- Get to grips with multi-layered IIoT security frameworks
- Implement a secure industrial architecture
- Gain insights into securing identity, access, and configuration management for large-scale IIoT deployments
- Secure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivity
- Explore case studies on industrial IoT threat modelling and mitigation approaches
- Uncover the process of mitigation planning and risk management
Who this book is for
If you’re a security professional, solutions architect, or IoT developers looking to understand and overcome challenges in connected IIoT devices, this book is for you. Some knowledge of IoT development and security is necessary to understand the concepts covered in this book.
Table of Contents
- An Unprecedented Opportunity at Stake
- Industrial Data Pipeline and Security Architecture
- IIoT Identity and Access Management
- Endpoint Security and Trustworthiness
- Securing Connectivity and Communications
- Securing IIoT Edge, Cloud and Apps
- Secure Processes and Governance
- IIoT Security using Emerging Technologies
- IIoT Security: Real World Case Studies
- The Road Ahead
- Appendix I
- Appendix II