O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security considerations for the functional viewpoint

Following are some of the security consideration for the functional viewpoint:

  • Security audit: To collect, store, and analyze security-related information.
  • Identity verification: In communications, it protects the integrity of communications within the IIoT system.
  • Cryptographic support: This involves software and hardware for encryption and decryption.
  • Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
  • Authentication and identity management: This ensures users only have access to the functions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required