Skip to Content
Architecting the Industrial Internet
book

Architecting the Industrial Internet

by Robert Stackowiak, Carla Romano, Shyam Varan Nath
September 2017
Intermediate to advanced
360 pages
9h 43m
English
Packt Publishing
Content preview from Architecting the Industrial Internet

Risk assessments and best security practices

A secure IIoT deployment strategy begins with architecture planning. As a design comes together, an evaluation of the proposed components' capabilities for supporting authentication and authorization capabilities, encryption of data, and configurability of software and firmware should begin. Proposed interfaces, such as those to be provided by the network, edge devices, and gateways, as well as user access, are also evaluated.

As the design nears completion, many choose to perform a risk assessment, identifying potential threats to the planned IIoT implementation and their consequences. Threats can come in many ways including through physical attacks, network attacks, attacks on software, attacks ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Industry 4.0: The Industrial Internet of Things

Industry 4.0: The Industrial Internet of Things

Alasdair Gilchrist
Industrial Internet Application Development

Industrial Internet Application Development

Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli
What Employees Want Most in Uncertain Times

What Employees Want Most in Uncertain Times

Kristine W. Powers, Jessica B.B. Diaz

Publisher Resources

ISBN: 9781787282759