Endpoint risk assessment and the implementation of security countermeasures require a thorough evaluation of the attack surfaces and attack vectors applicable to IIoT-specific use cases. Interested readers are encouraged to refer to the Industrial Internet Security Framework specification, which presents an elaborate analysis on "Security Threats and Vulnerabilities on Endpoints" (IIC-IISF). In this section, a few common threats and vulnerabilities associated with the various endpoint components are cited as examples:
Endpoint component |
Threats and Vulnerability |
Hardware |
|
... |