O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Planning for security in the supply chain example

You will recall from the generic supply chain example and the CEMENTruck Inc. example that data is captured from sensors on equipment in the plants and from vehicles in transit. This data is transmitted to cloud-based backend systems for real-time streaming analytics processing and for batch processing in a data lake and data warehouse infrastructure.

The following diagram represents such a scenario:

Figure 8.7: IIoT End-to-End Security

To ensure a secure infrastructure, we will need to put in place many of the security measures that we previously discussed in this chapter in the devices and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required