Cargando…

IoT and OT Security Handbook : Assess Risks, Manage Vulnerabilities, and Monitor Threats with Microsoft Defender for IoT /

Leverage Defender for IoT for understanding common attacks and achieving zero trust for IoT and OT devices Purchase of the print or Kindle book includes a free PDF eBook Key Features Identify and resolve cybersecurity challenges in the IoT and OT worlds Familiarize yourself with common attack vector...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Jain, Smita (Autor), Lakshmi, Vasantha (Autor)
Otros Autores: Srivathsa, Rohini (writer of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Copyright
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Understand the Challenges in IoT/OT Security and Common Attacks
  • Chapter 1: Addressing Cybersecurity in the Age of Industry 4.0
  • How is Industry 4.0 being leveraged?
  • Understanding cybersecurity challenges in the age of Industry 4.0
  • Enumerating the factors influencing IoT/OT security
  • How to overcome security challenges
  • Summary
  • Chapter 2: Delving into Network Segmentation-Based Reference Architecture
  • the Purdue Model
  • Zero-trust architecture
  • Network segmentation in the IoT/OT environment
  • Understanding the layers of the Purdue model
  • How layers disrupt security when not managed well
  • Data diodes
  • Data diodes in action in OT/IoT
  • Summary
  • Chapter 3: Common Attacks on IoT/OT Environments
  • Why do we see frequent attacks on the OT/IoT environment?
  • Diminishing airgap
  • The legacy of OT assets
  • Who performs attacks on OT/IoT systems and how and why do they do it?
  • Famous OT attacks
  • The Triton attack
  • Oldsmar cyberattack on the US water system
  • The Colonial Pipeline cyberattack
  • The Ukraine electric grid attack
  • How do these attacks impact businesses and humans?
  • Summary
  • Part 2: How Defender for IOT Can Address the Open Challenges in the Connected World We Live in Today
  • Chapter 4: What Is Microsoft Defender for IoT?
  • The IoT and OT environments
  • The role of asset inventory
  • Risk and vulnerability management
  • Continuous threat monitoring
  • Operational efficiency
  • MDIoT benefits
  • Zero impact on network performance
  • Quick deployment
  • Advanced threat detection
  • Summary
  • Chapter 5: How Does Defender for IoT Fit into Your OT/IoT Environment/Architecture?
  • The topology of network architecture
  • The most common network topologies in OT/IoT networks
  • A multilayer, multitenant network
  • Diverse ways of traffic mirroring for OT monitoring
  • SPAN
  • Active and passive aggregation
  • How the Purdue model is applied to MDIoT
  • Sensor placement considerations
  • OT sensor cloud connection methods
  • Azure proxy
  • Proxy chaining
  • Connecting directly
  • Multi-cloud connections
  • Summary
  • Chapter 6: How Do the Microsoft Defender for IoT Features Help in Addressing Open Challenges?
  • Missing asset inventory for IoT/OT devices
  • Risk and vulnerability management
  • Continuous IoT/OT threat monitoring, incident response, and threat intelligence
  • The installation of the MDIoT service
  • Summary
  • Part 3: Best Practices to Achieve Continuous Monitoring, Vulnerability Management, Threat Monitoring and Hunting, and to Align the Business Model Toward Zero Trust
  • Chapter 7: Asset Inventory
  • The device inventory in an on-premises console or the sensor console and the Azure portal