Cargando…

Practical Industrial Internet of Things security : a practitioner's guide to securing connected industries /

This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bhattacharjee, Sravani (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1050953358
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 180906s2018 enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d STF  |d TEFOD  |d CEF  |d N$T  |d G3B  |d EBLCP  |d MERUC  |d UAB  |d OCLCQ  |d UX1  |d K6U  |d NLW  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1175634058 
020 |a 9781788830850  |q (electronic bk.) 
020 |a 1788830857  |q (electronic bk.) 
020 |z 9781788832687 
020 |a 178883268X  |q (Trade Paper) 
020 |a 9781788832687 
024 3 |a 9781788832687 
029 1 |a AU@  |b 000066202941 
035 |a (OCoLC)1050953358  |z (OCoLC)1175634058 
037 |a CL0500000989  |b Safari Books Online 
037 |a 4EB0E585-0C88-41A5-A3E9-93FAA19281F8  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.8857 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.678  |2 23 
049 |a UAMI 
100 1 |a Bhattacharjee, Sravani,  |e author. 
245 1 0 |a Practical Industrial Internet of Things security :  |b a practitioner's guide to securing connected industries /  |c Sravani Bhattacharjee. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed November 14, 2018) 
505 0 |a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Foreword; Contributors; Disclaimer; Table of Contents; Preface; Chapter 1: An Unprecedented Opportunity at Stake; Defining the Industrial IoT; Industrial IoT, Industrial Internet, and Industrie 4.0; Consumer versus Industrial IoT; Industrial IoT security-a business imperative; Cybersecurity versus cyber-physical IoT security; What is a cyber-physical system?; Industrial ""things, "" connectivity, and operational technologies; Operational technology; Machine-to-Machine; An overview of SCADA, DCS, and PLC 
505 8 |a Industrial control system architectureICS components and data networks; ICS network components; Fieldbus protocols; IT and OT convergence -what it really means; Industrial IoT deployment architecture; Divergence in IT and OT security fundamentals; Operational priorities; Attack surface and threat actors; Interdependence of critical infrastructures; Industrial threats, vulnerabilities, and risk factors; Threats and threat actors; Vulnerabilities; Policy and procedure vulnerabilities; Platform vulnerabilities; Software platform vulnerabilities; Network vulnerability; Risks 
505 8 |a Evolution of cyber-physical attacksIndustrial IoT use cases -examining the cyber risk gap; Energy and smart grids; Manufacturing; Cyberattack on industrial control systems-Stuxnet case study; Event flow; Key points; Risk gap summary; Smart city and autonomous transportation; Healthcare and pharmaceuticals; The ransomware attack on the healthcare enterprise-""WannaCry"" case study; Cyber risk gap summary; Summary; Chapter 2: Industrial IoT Dataflow and Security Architecture; Primer on IIoT attacks and countermeasures; Attack surfaces and attack vectors; OWASP IoT attack surfaces 
505 8 |a Attack treesFault tree analysis; Threat modeling; STRIDE threat model; DREAD threat model; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security architecture; Business viewpoint; Usage viewpoint; Functional viewpoint; Implementation viewpoint; IIoT architecture patterns; Pattern 1 -- Three-tier architectural model; Pattern 2- Layered databus architecture; Building blocks of industrial IoT security architecture; A four-tier IIoT security model; Summary; Chapter 3: IIoT Identity and Access Management; A primer on identity and access control 
505 8 |a IdentificationAuthentication; Authorization; Account management; Distinguishing features of IAM in IIoT; Diversity of IIoT endpoints; Resource-constrained and brownfield considerations; Physical safety and reliability; Autonomy and scalability; Event logging is a rarity; Subscription-based models; Increasing sophistication of identity attacks; Risk-based access control policy; Identity management across the device lifecycle; Authentication and authorization frameworks for IIoT; Password-based authentication; Biometrics; Multi-factor authentication; Key-based authentication; Symmetric keys 
520 |a This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a Knovel  |b ACADEMIC - Software Engineering 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Internet of things  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Business enterprises  |x Computer networks  |x Management. 
650 6 |a Internet des objets  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Entreprises  |x Réseaux d'ordinateurs  |x Gestion. 
650 7 |a Portable & handheld devices: consumer/user guides.  |2 bicssc 
650 7 |a Mobile phones: consumer/user guides.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Computer hardware.  |2 bicssc 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Management  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781788832687/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5495617  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5495617 
938 |a EBSCOhost  |b EBSC  |n 1860858 
994 |a 92  |b IZTAP