Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Industrial IoT for Architects and Engineers

You're reading from   Industrial IoT for Architects and Engineers Architecting secure, robust, and scalable industrial IoT solutions with AWS

Arrow left icon
Product type Paperback
Published in Jan 2023
Publisher Packt
ISBN-13 9781803240893
Length 344 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Bharath Sridhar Bharath Sridhar
Author Profile Icon Bharath Sridhar
Bharath Sridhar
Joey Bernal Joey Bernal
Author Profile Icon Joey Bernal
Joey Bernal
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Part 1:An Introduction to Industrial IoT and Moving Toward Industry 4.0
2. Chapter 1: Welcome to the IoT Revolution FREE CHAPTER 3. Chapter 2: Anatomy of an IoT Architecture 4. Chapter 3: In-Situ Environmental Monitoring 5. Chapter 4: Real-World Environmental Monitoring 6. Part 2: IoT Integration for Industrial Protocols and Systems
7. Chapter 5: OT and Industrial Control Systems 8. Chapter 6: Enabling Industrial IoT 9. Chapter 7: PLC Data Acquisition and Analysis 10. Chapter 8: Asset and Condition Monitoring 11. Part 3:Building Scalable, Robust, and Secure Solutions
12. Chapter 9: Taking It Up a Notch – Scalable, Robust, and Secure Architectures 13. Chapter 10: Intelligent Systems at the Edge 14. Chapter 11: Remote Monitoring Challenges 15. Chapter 12: Advanced Analytics and Machine Learning 16. Index 17. Other Books You May Enjoy Appendix: General Cybersecurity Topics

OT cybersecurity areas of concern

In addition to the preceding list, Figure A.6 provides a short list of some of the pillars of cybersecurity by type. These can be considered capabilities of a fully functional DMZ, as discussed earlier. Factory personnel use applications deployed within the OT network or factory network almost exclusively for viewing, gathering or controlling data. The ability to update and access those applications securely is critical.

Figure A.6 – Major pillars of OT cybersecurity

Network and equipment monitoring is another area where capabilities can be added. The ability to continuously monitor threats to the system can provide some initial protection you may not already have.

Finally, the management of the network and environment should be considered. How are firewall rules checked and changed? What processes are in place for incident response? Is there a Disaster Recovery (DR) plan in place?

Figure A.6 can act as a...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at AU $24.99/month. Cancel anytime