O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Risk assessments and best security practices

A secure IIoT deployment strategy begins with architecture planning. As a design comes together, an evaluation of the proposed components' capabilities for supporting authentication and authorization capabilities, encryption of data, and configurability of software and firmware should begin. Proposed interfaces, such as those to be provided by the network, edge devices, and gateways, as well as user access, are also evaluated.

As the design nears completion, many choose to perform a risk assessment, identifying potential threats to the planned IIoT implementation and their consequences. Threats can come in many ways including through physical attacks, network attacks, attacks on software, attacks ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required