O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Device considerations

When customized devices and sensors must be considered to provide the necessary metrics, the design phase assumes even more importance in minimizing the possibility of future security breaches. The hardware should be scoped to minimum requirements at access points such as I/O ports and should be made tamper proof. Secure software upgrade procedures for firmware and applications must also be planned.

In many situations, you will be faced with defining security measures around predefined devices that lack the features needed to put into place adequate security measures. In these situations, much of the focus often turns to securing field gateways at the edge to control unauthorized access from the outside world.

Many of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required