O'Reilly logo

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT by Marcelo Yannuzzi, Rik Irons-Mclean, Anthony Sabella

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Threat Defense

Topics covered in this chapter include

   Network Address Translation (NAT)

   Packet Filtering Techniques and Inherent Problems with Industrial Communication Protocols

   Application Visibility and Control

   IDS/IPS Technology

   Behavior Analysis

   Encrypted Traffic Analytics

   Malware Protection

   Malicious Domain Protection (DNS-Based Security)

   Use Case Examples of Centralized and Distributed VNF Placement

The previous chapter focused on technologies to identify endpoints, provide adaptable authentication mechanisms to ensure that an endpoint is what it claims to be, and then provide the appropriate level of access privileges based on its identity. That technology is engaged before the endpoint ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required