Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries
This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Birmingham, UK :
Packt Publishing,
2018.
|
Subjects: | |
ISBN: | 9781788830850 1788830857 9781788832687 178883268X |
Physical Description: | 1 online resource (1 volume) : illustrations |
LEADER | 05060cam a2200445 i 4500 | ||
---|---|---|---|
001 | kn-on1050953358 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 180906s2018 enka o 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d STF |d TEFOD |d CEF |d N$T |d G3B |d EBLCP |d MERUC |d UAB |d OCLCQ |d UX1 |d K6U |d NLW |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d SXB | ||
020 | |a 9781788830850 |q (electronic bk.) | ||
020 | |a 1788830857 |q (electronic bk.) | ||
020 | |z 9781788832687 | ||
020 | |a 178883268X |q (Trade Paper) | ||
020 | |a 9781788832687 | ||
024 | 3 | |a 9781788832687 | |
035 | |a (OCoLC)1050953358 |z (OCoLC)1175634058 | ||
100 | 1 | |a Bhattacharjee, Sravani, |e author. | |
245 | 1 | 0 | |a Practical Industrial Internet of Things security : |b a practitioner's guide to securing connected industries / |c Sravani Bhattacharjee. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2018. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Foreword; Contributors; Disclaimer; Table of Contents; Preface; Chapter 1: An Unprecedented Opportunity at Stake; Defining the Industrial IoT; Industrial IoT, Industrial Internet, and Industrie 4.0; Consumer versus Industrial IoT; Industrial IoT security-a business imperative; Cybersecurity versus cyber-physical IoT security; What is a cyber-physical system?; Industrial ""things, "" connectivity, and operational technologies; Operational technology; Machine-to-Machine; An overview of SCADA, DCS, and PLC | |
505 | 8 | |a Industrial control system architectureICS components and data networks; ICS network components; Fieldbus protocols; IT and OT convergence -what it really means; Industrial IoT deployment architecture; Divergence in IT and OT security fundamentals; Operational priorities; Attack surface and threat actors; Interdependence of critical infrastructures; Industrial threats, vulnerabilities, and risk factors; Threats and threat actors; Vulnerabilities; Policy and procedure vulnerabilities; Platform vulnerabilities; Software platform vulnerabilities; Network vulnerability; Risks | |
505 | 8 | |a Evolution of cyber-physical attacksIndustrial IoT use cases -examining the cyber risk gap; Energy and smart grids; Manufacturing; Cyberattack on industrial control systems-Stuxnet case study; Event flow; Key points; Risk gap summary; Smart city and autonomous transportation; Healthcare and pharmaceuticals; The ransomware attack on the healthcare enterprise-""WannaCry"" case study; Cyber risk gap summary; Summary; Chapter 2: Industrial IoT Dataflow and Security Architecture; Primer on IIoT attacks and countermeasures; Attack surfaces and attack vectors; OWASP IoT attack surfaces | |
505 | 8 | |a Attack treesFault tree analysis; Threat modeling; STRIDE threat model; DREAD threat model; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security architecture; Business viewpoint; Usage viewpoint; Functional viewpoint; Implementation viewpoint; IIoT architecture patterns; Pattern 1 -- Three-tier architectural model; Pattern 2- Layered databus architecture; Building blocks of industrial IoT security architecture; A four-tier IIoT security model; Summary; Chapter 3: IIoT Identity and Access Management; A primer on identity and access control | |
505 | 8 | |a IdentificationAuthentication; Authorization; Account management; Distinguishing features of IAM in IIoT; Diversity of IIoT endpoints; Resource-constrained and brownfield considerations; Physical safety and reliability; Autonomy and scalability; Event logging is a rarity; Subscription-based models; Increasing sophistication of identity attacks; Risk-based access control policy; Identity management across the device lifecycle; Authentication and authorization frameworks for IIoT; Password-based authentication; Biometrics; Multi-factor authentication; Key-based authentication; Symmetric keys | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud. | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Internet of things |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Business enterprises |x Computer networks |x Management. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpPIITS002/practical-industrial-internet?kpromoter=marc |y Full text |