Security monitoring
The monitoring of operational data provides valuable insights about device health, asset performance, and asset tracking. However, to secure an IIoT deployment, in addition to operational data, it is also essential to monitor the security data (IIC-IISF). Monitoring security data helps to detect event sequences, for example, a successful login from an unexpected endpoint, followed by a network whitelisting violation, which together indicate a potential attack in progress.
The primary sources of security data are monitored by endpoints and the network. Some examples of security data are device access and activity logs, event timestamp and device location, network traffic volume, and connection setup and teardown timestamps. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access