This chapter presented a few emerging concepts and enabling technologies for IIoT security. The current state of the art and practical viability of these technologies were also discussed. Intense research and development and pilots are in progress, as these technologies continue to mature. To gain an in-depth understanding and to keep up with the evolutionary track of these enablers, the interested reader is encouraged to utilize the references provided in this chapter.
The next chapter presents real-world scenarios to analyze the anatomy of an industrial cyberattack and to see how enterprises are implementing IIoT security best practices to protect their connected assets and infrastructures.