-
Book Overview & Buying
-
Table Of Contents
IoT and OT Security Handbook
By :
We are seeing fast-paced digital transformation in all industries, including the operational technology (OT) and Internet of Things (IoT) industries.
The different eras of industry, as seen in Figure 1.1, have brought significant changes in the ways businesses work. Revolutionary changes within the way that industries operate have been brought about by manufacturing companies becoming more secure, efficient, productive, and profitable:
Figure 1.1 – The different eras of industrial revolution
The computing technology of Industry 4.0 is powered by a connected network and has a digital twin on the internet too. This enables communication and information sharing. This networking is sometimes referred to as a cyber-physical production system. This makes organizations and industries more autonomous. First, let us look at how Industry 4.0 came to be:
The entire journey from Industry 1.0 to 4.0 has made business more profitable, agile, and cost-effective. Automation and intelligence have also introduced visibility into the demand and supply of raw materials and enhanced the quality of finished products. Businesses are now more empowered by all the intelligence derived from the system to make the right decisions.
Microsoft presently invests over $5 billion in IoT research and is a pacesetter regarding this new technology, thus contributing to the overall Industry 4.0 revolution. Microsoft Defender for IoT (MDIoT) is accelerating this digital transformation for organizations, with comprehensive security across IoT or OT infrastructure. MDIoT provides agentless network detection and response (NDR). The technology is rapidly deployed and works with various IoT, OT, and industrial control systems (ICS). For IoT device producers, MDIoT provides a lightweight agent to enhance device-level security. It is a solution that interacts with Microsoft 365 Defender, Microsoft Sentinel, Microsoft Defender for Endpoint, devices, and external security operations center (SOC) tools. It can be deployed on-premises, in a hybrid setup, or via the cloud. MDIOT covers the IoT, OT, and the Enterprise Internet of Things (EIoT). This book focuses on securing OT.
Before we get to that, though, in this chapter, we will cover the following topics:
Change the font size
Change margin width
Change background colour