September 2017
Intermediate to advanced
360 pages
9h 43m
English
A secure IIoT deployment strategy begins with architecture planning. As a design comes together, an evaluation of the proposed components' capabilities for supporting authentication and authorization capabilities, encryption of data, and configurability of software and firmware should begin. Proposed interfaces, such as those to be provided by the network, edge devices, and gateways, as well as user access, are also evaluated.
As the design nears completion, many choose to perform a risk assessment, identifying potential threats to the planned IIoT implementation and their consequences. Threats can come in many ways including through physical attacks, network attacks, attacks on software, attacks ...