July 2018
Intermediate to advanced
324 pages
9h 31m
English
The deployment phase is when the rubber meets the road. The vital first steps of a secured IIoT deployment are the following:
As noted before, an IIoT deployment involves multiple subsystems, platforms, technologies, and an ecosystem of vendors. This provides a perfect environment for mistakes and inadvertent exposure to threats. This book extensively discusses methods to properly plan and ensure security at various layers. However, a valid question at this stage is "what" should be secured and by "how much." Securing "everything" is ideal, but not practical. It leads to unwanted cost barriers and ...
Read now
Unlock full access