O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security considerations for the implementation viewpoint

End-to-end security includes securing both IT and OT realms and their integration points.

Securing legacy systems includes securing legacy endpoints, systems, and data transmission in order to minimize the risks of an attack on the older systems. Each architectural pattern has its own unique sets of risks and areas to secure, including end points, information exchange, management and control, and data distribution and storage.

End-point security embeds security in the devices itself, enabling them to protect themselves while disconnected from any central security management systems. Information exchange security protects communication and data exchanges, ensuring that the data remains ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required