Book description
Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world.
Key Features
- Gain practical insight into security concepts in the Industrial Internet of Things (IIoT) architecture
- Demystify complex topics such as cryptography and blockchain
- Comprehensive references to industry standards and security frameworks when developing IIoT blueprints
Book Description
Securing connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security is an intricate discipline that directly ties to system reliability as well as human and environmental safety. Practical Industrial Internet of Things Security enables you to develop a comprehensive understanding of the entire spectrum of securing connected industries, from the edge to the cloud.
This book establishes the foundational concepts and tenets of IIoT security by presenting real-world case studies, threat models, and reference architectures. You'll work with practical tools to design risk-based security controls for industrial use cases and gain practical know-how on the multi-layered defense techniques including Identity and Access Management (IAM), endpoint security, and communication infrastructure. Stakeholders, including developers, architects, and business leaders, can gain practical insights in securing IIoT lifecycle processes, standardization, governance and assess the applicability of emerging technologies, such as blockchain, Artificial Intelligence, and Machine Learning, to design and implement resilient connected systems and harness significant industrial opportunities.
What you will learn
- Understand the crucial concepts of a multi-layered IIoT security framework
- Gain insight on securing identity, access, and configuration management for large-scale IIoT deployments
- Secure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivity
- Build a concrete security program for your IIoT deployment
- Explore techniques from case studies on industrial IoT threat modeling and mitigation approaches
- Learn risk management and mitigation planning
Who this book is for
Practical Industrial Internet of Things Security is for the IIoT community, which includes IIoT researchers, security professionals, architects, developers, and business stakeholders. Anyone who needs to have a comprehensive understanding of the unique safety and security challenges of connected industries and practical methodologies to secure industrial assets will find this book immensely helpful. This book is uniquely designed to benefit professionals from both IT and industrial operations backgrounds.
Publisher resources
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- Packt Upsell
- Foreword
- Contributors
- Disclaimer
- Preface
-
An Unprecedented Opportunity at Stake
- Defining the Industrial IoT
- Industrial IoT security – a business imperative
- Cybersecurity versus cyber-physical IoT security
- Industrial "things," connectivity, and operational technologies
- IT and OT convergence – what it really means
- Industrial IoT deployment architecture
- Divergence in IT and OT security fundamentals
- Industrial threats, vulnerabilities, and risk factors
- Evolution of cyber-physical attacks
- Industrial IoT use cases – examining the cyber risk gap
- Summary
-
Industrial IoT Dataflow and Security Architecture
- Primer on IIoT attacks and countermeasures
- Trustworthiness of an IIoT system
- Industrial big data pipeline and architectures
- Industrial IoT security architecture
- Summary
-
IIoT Identity and Access Management
- A primer on identity and access control
- Distinguishing features of IAM in IIoT
- Identity management across the device lifecycle
- Authentication and authorization frameworks for IIoT
- Trust models – public key infrastructures and digital certificates
- PKI certificate standards for IIoT
- Extending the OAuth 2.0 authorization framework for IoT access control
- IEEE 802.1x
- Identity support in messaging protocols
- Monitoring and management capabilities
- Building an IAM strategy for IIoT deployment
- Summary
-
Endpoint Security and Trustworthiness
- Defining an IIoT endpoint
- Endpoint security enabling technologies
- IIoT endpoint vulnerabilities
- Establishing trust in hardware
- Endpoint identity and access control
- Initialization and boot process integrity
- Establishing endpoint trust during operations
- Endpoint data integrity
- Endpoint security using isolation techniques
- Endpoint physical security
- Machine learning enabled endpoint security
- Endpoint security testing and certification
- Endpoint protection industry standards
- Summary
-
Securing Connectivity and Communications
- Definitions – networking, communications, and connectivity
- Distinguishing features of IIoT connectivity
- IIoT connectivity architectures
-
Controls for IIoT connectivity protection
- Secure tunnels and VPNs
- Cryptography controls
- Network segmentation
- Industrial demilitarized zones
- Boundary defense with firewalls and filtering
- Comprehensive access control
- Core and edge gateways
- Unidirectional gateway protection
- Asset discovery, visibility, and monitoring
- Physical security – the first line of defense
- Security assessment of IIoT connectivity standards and protocols
- Fieldbus protocols
- Connectivity framework standards
- Connectivity transport standards
- Connectivity network standards
- Data link and physical access standards
- Summary
-
Securing IIoT Edge, Cloud, and Apps
- Defining edge, fog, and cloud computing
- IIoT cloud security architecture
- Cloud security – shared responsibility model
- Defense-in-depth cloud security strategy
- Infrastructure security
- Identity and access management
- Application security
- Data protection
- Data encryption
- Securing the data life cycle
- Cloud security operations life cycle
- Secure device management
- Cloud security standards and compliance
- Case study of IIoT cloud platforms
- Cloud security assessment
- Summary
-
Secure Processes and Governance
- Challenges of unified security governance
- Securing processes across the IIoT life cycle
- Understanding security roles
- Elements of an IIoT security program
- Security maturity model
-
Implementing an IIoT security program
- Establishing an IIoT security team
- Deciding on regulatory compliance
- Assessing and managing risks
- Managing third-party security
- Enforcing the security policy
- Continuous monitoring and analysis
- Conducting security training
- Implementing incident management
- Defining security audits
- Security revisions and maturity
- Summary
- IIoT Security Using Emerging Technologies
-
Real-World Case Studies in IIoT Security
- Analysis of a real-world cyber-physical attack
- Case study 2 – Building a successful IIoT security program
- Case study 3 – ISA/IEC 62443 based industrial endpoint protection
- Summary
- The Road Ahead
- I
- II
- Other Books You May Enjoy
Product information
- Title: Practical Industrial Internet of Things Security
- Author(s):
- Release date: July 2018
- Publisher(s): Packt Publishing
- ISBN: 9781788832687
You might also like
book
Container Security
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers …
book
Learning Modern Linux
If you use Linux in development or operations and need a structured approach to help you …
book
Generative Deep Learning, 2nd Edition
Generative AI is the hottest topic in tech. This practical book teaches machine learning engineers and …
book
Quick Start Guide to Large Language Models: Strategies and Best Practices for using ChatGPT and Other LLMs
The advancement of Large Language Models (LLMs) has revolutionized the field of Natural Language Processing in …