O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

The broad footprint of IIoT solutions can make securing these solutions challenging. Security considerations must extend from devices in the field at the edge to the data center and include the networking that ties them together.

In this chapter, we explored cybersecurity, including methods of attack, core building blocks, frameworks and guidelines, securing devices and the edge-to-the-cloud gateways, and securing backend services, and considered the scope that is covered in risk assessments and best security practices. We applied some of these techniques to the supply chain example.

You should now have gained an understanding as to where potential vulnerabilities might occur. You should also better understand how the components that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required