Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries

This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge...

Full description

Saved in:
Bibliographic Details
Main Author: Bhattacharjee, Sravani, (Author)
Format: eBook
Language: English
Published: Birmingham, UK : Packt Publishing, 2018.
Subjects:
ISBN: 9781788830850
1788830857
9781788832687
178883268X
Physical Description: 1 online resource (1 volume) : illustrations

Cover

Table of contents

LEADER 05060cam a2200445 i 4500
001 kn-on1050953358
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 180906s2018 enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d STF  |d TEFOD  |d CEF  |d N$T  |d G3B  |d EBLCP  |d MERUC  |d UAB  |d OCLCQ  |d UX1  |d K6U  |d NLW  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d SXB 
020 |a 9781788830850  |q (electronic bk.) 
020 |a 1788830857  |q (electronic bk.) 
020 |z 9781788832687 
020 |a 178883268X  |q (Trade Paper) 
020 |a 9781788832687 
024 3 |a 9781788832687 
035 |a (OCoLC)1050953358  |z (OCoLC)1175634058 
100 1 |a Bhattacharjee, Sravani,  |e author. 
245 1 0 |a Practical Industrial Internet of Things security :  |b a practitioner's guide to securing connected industries /  |c Sravani Bhattacharjee. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Foreword; Contributors; Disclaimer; Table of Contents; Preface; Chapter 1: An Unprecedented Opportunity at Stake; Defining the Industrial IoT; Industrial IoT, Industrial Internet, and Industrie 4.0; Consumer versus Industrial IoT; Industrial IoT security-a business imperative; Cybersecurity versus cyber-physical IoT security; What is a cyber-physical system?; Industrial ""things, "" connectivity, and operational technologies; Operational technology; Machine-to-Machine; An overview of SCADA, DCS, and PLC 
505 8 |a Industrial control system architectureICS components and data networks; ICS network components; Fieldbus protocols; IT and OT convergence -what it really means; Industrial IoT deployment architecture; Divergence in IT and OT security fundamentals; Operational priorities; Attack surface and threat actors; Interdependence of critical infrastructures; Industrial threats, vulnerabilities, and risk factors; Threats and threat actors; Vulnerabilities; Policy and procedure vulnerabilities; Platform vulnerabilities; Software platform vulnerabilities; Network vulnerability; Risks 
505 8 |a Evolution of cyber-physical attacksIndustrial IoT use cases -examining the cyber risk gap; Energy and smart grids; Manufacturing; Cyberattack on industrial control systems-Stuxnet case study; Event flow; Key points; Risk gap summary; Smart city and autonomous transportation; Healthcare and pharmaceuticals; The ransomware attack on the healthcare enterprise-""WannaCry"" case study; Cyber risk gap summary; Summary; Chapter 2: Industrial IoT Dataflow and Security Architecture; Primer on IIoT attacks and countermeasures; Attack surfaces and attack vectors; OWASP IoT attack surfaces 
505 8 |a Attack treesFault tree analysis; Threat modeling; STRIDE threat model; DREAD threat model; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security architecture; Business viewpoint; Usage viewpoint; Functional viewpoint; Implementation viewpoint; IIoT architecture patterns; Pattern 1 -- Three-tier architectural model; Pattern 2- Layered databus architecture; Building blocks of industrial IoT security architecture; A four-tier IIoT security model; Summary; Chapter 3: IIoT Identity and Access Management; A primer on identity and access control 
505 8 |a IdentificationAuthentication; Authorization; Account management; Distinguishing features of IAM in IIoT; Diversity of IIoT endpoints; Resource-constrained and brownfield considerations; Physical safety and reliability; Autonomy and scalability; Event logging is a rarity; Subscription-based models; Increasing sophistication of identity attacks; Risk-based access control policy; Identity management across the device lifecycle; Authentication and authorization frameworks for IIoT; Password-based authentication; Biometrics; Multi-factor authentication; Key-based authentication; Symmetric keys 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Internet of things  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Business enterprises  |x Computer networks  |x Management. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpPIITS002/practical-industrial-internet?kpromoter=marc  |y Full text