O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the backend

We will now turn our attention to strategies for securing the backend components. The following diagram indicates the components we will consider, as shown in the shaded area:

Figure 8.6: Backend Security

The streaming analytics engines provide a location to deploy applications, such as those that apply machine learning algorithms, on transient data. The security mechanisms for streaming analytics engines are less sophisticated today when compared to the data-management systems (such as the data lake, data warehouse, and data mart that are pictured). This is due, in part, to the limited requirements for administrative ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required