Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Industrial Internet Application Development

You're reading from   Industrial Internet Application Development Simplify IIoT development using public cloud and native cloud services

Arrow left icon
Product type Paperback
Published in Sep 2018
Publisher Packt
ISBN-13 9781788298599
Length 412 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (4):
Arrow left icon
Veera Kishore Reddipalli Veera Kishore Reddipalli
Author Profile Icon Veera Kishore Reddipalli
Veera Kishore Reddipalli
Alena Traukina Alena Traukina
Author Profile Icon Alena Traukina
Alena Traukina
Jayant Thomas Jayant Thomas
Author Profile Icon Jayant Thomas
Jayant Thomas
Prashant Tyagi Prashant Tyagi
Author Profile Icon Prashant Tyagi
Prashant Tyagi
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. IIoT Fundamentals and Components FREE CHAPTER 2. IIoT Application Architecture and Design 3. IIoT Edge Development 4. Data for IIoT 5. Advanced Analytics for the IIoT 6. Developing Your First Application for IIoT 7. Deployment, Scale, and Security 8. Reliability, Fault Tolerance, and Monitoring IIoT Applications 9. Implementing IIoT Applications with Predix 10. Best Practices for IIoT Applications 11. Future Direction of the IIoT 12. Other Books You May Enjoy

IIoT security practices

Consider the Distributed Denial of Service (DDoS) attack of October 16th, 2016, which almost brought down the internet on the east coast of the USA due to its attack on DYN's servers. This was later identified as having been due to a Mirai botnet attack using Internet of Things (IoT) devices, such as cameras, home routers, and so on. The Mirai bot targeted devices that used a stripped-down Linux OS by scanning the internet for open Telnet ports and logging into the device using one of the default passwords, thereby taking over the devices and using them for the DDoS. This is a very clever and effective way to implement a bot that rides on IoT devices. With billions of IoT devices around, these types of attacks have become common and it is natural that some of these attacks will be targeted toward IIoT devices as well, which could have a devastating...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime