Book Image

Practical Industrial Internet of Things Security

By : Sravani Bhattacharjee
Book Image

Practical Industrial Internet of Things Security

By: Sravani Bhattacharjee

Overview of this book

Securing connected industries and autonomous systems is of primary concern to the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security directly ties to system reliability as well as human and environmental safety. This hands-on guide begins by establishing the foundational concepts of IIoT security with the help of real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical knowledge of multi-layered defense techniques, including identity and access management (IAM), endpoint security, and communication infrastructure. You’ll also understand how to secure IIoT lifecycle processes, standardization, and governance. In the concluding chapters, you’ll explore the design and implementation of resilient connected systems with emerging technologies such as blockchain, artificial intelligence, and machine learning. By the end of this book, you’ll be equipped with the all the knowledge required to design industry-standard IoT systems confidently.
Table of Contents (22 chapters)
Title Page
Copyright and Credits
Dedication
Packt Upsell
Foreword
Contributors
Disclaimer
Preface
I
I
Index

Industrial collaboration


Industrial IoT deployments typically involve several vendors. In Chapter 9, Real-World Case Studies in IIoT Security, the challenges associated with vendor complexity in the case of an automated offshore drilling IACS were discussed. For an industrial user of IIoT, it is a daunting task to coordinate the security postures of the solutions. In addition, there are complexities related to installation, confirmation, and device management that further increase the chances of human errors and insider threats. An overarching collaborative model for pre-deployment security testing of multi-vendor solutions, to coherently define, enforce, and monitor security policies, can minimize risks.

The IIC has an interesting platform for collaboration among IoT vendors, through their testbed program. At the time of this writing, there are nearly thirty testbeds, where any new IIoT technology, service, or product is incubated and rigorously tested to verify its utility before being...