IoT and OT Security Handbook : Assess Risks, Manage Vulnerabilities, and Monitor Threats with Microsoft Defender for IoT /
Leverage Defender for IoT for understanding common attacks and achieving zero trust for IoT and OT devices Purchase of the print or Kindle book includes a free PDF eBook Key Features Identify and resolve cybersecurity challenges in the IoT and OT worlds Familiarize yourself with common attack vector...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing, Limited,
2023.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Copyright
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: Understand the Challenges in IoT/OT Security and Common Attacks
- Chapter 1: Addressing Cybersecurity in the Age of Industry 4.0
- How is Industry 4.0 being leveraged?
- Understanding cybersecurity challenges in the age of Industry 4.0
- Enumerating the factors influencing IoT/OT security
- How to overcome security challenges
- Summary
- Chapter 2: Delving into Network Segmentation-Based Reference Architecture
- the Purdue Model
- Zero-trust architecture
- Network segmentation in the IoT/OT environment
- Understanding the layers of the Purdue model
- How layers disrupt security when not managed well
- Data diodes
- Data diodes in action in OT/IoT
- Summary
- Chapter 3: Common Attacks on IoT/OT Environments
- Why do we see frequent attacks on the OT/IoT environment?
- Diminishing airgap
- The legacy of OT assets
- Who performs attacks on OT/IoT systems and how and why do they do it?
- Famous OT attacks
- The Triton attack
- Oldsmar cyberattack on the US water system
- The Colonial Pipeline cyberattack
- The Ukraine electric grid attack
- How do these attacks impact businesses and humans?
- Summary
- Part 2: How Defender for IOT Can Address the Open Challenges in the Connected World We Live in Today
- Chapter 4: What Is Microsoft Defender for IoT?
- The IoT and OT environments
- The role of asset inventory
- Risk and vulnerability management
- Continuous threat monitoring
- Operational efficiency
- MDIoT benefits
- Zero impact on network performance
- Quick deployment
- Advanced threat detection
- Summary
- Chapter 5: How Does Defender for IoT Fit into Your OT/IoT Environment/Architecture?
- The topology of network architecture
- The most common network topologies in OT/IoT networks
- A multilayer, multitenant network
- Diverse ways of traffic mirroring for OT monitoring
- SPAN
- Active and passive aggregation
- How the Purdue model is applied to MDIoT
- Sensor placement considerations
- OT sensor cloud connection methods
- Azure proxy
- Proxy chaining
- Connecting directly
- Multi-cloud connections
- Summary
- Chapter 6: How Do the Microsoft Defender for IoT Features Help in Addressing Open Challenges?
- Missing asset inventory for IoT/OT devices
- Risk and vulnerability management
- Continuous IoT/OT threat monitoring, incident response, and threat intelligence
- The installation of the MDIoT service
- Summary
- Part 3: Best Practices to Achieve Continuous Monitoring, Vulnerability Management, Threat Monitoring and Hunting, and to Align the Business Model Toward Zero Trust
- Chapter 7: Asset Inventory
- The device inventory in an on-premises console or the sensor console and the Azure portal