This chapter presented a primer of attacks, countermeasures, and threat modeling, which lays the foundation for effective risk analysis and mitigation. It also provided the readers with insights into the distinguishing characteristics of trustworthiness for IIoT systems and the functional components of the industrial big data pipeline.
IIoT systems are highly complex; this chapter presented IIoT architectural viewpoints and patterns as developed by the IIC to provide you with a crisp understanding of end-to-end IIoT system components. Based on usage, operations, and functional domains, the IIoT security architecture was decomposed into a four-tier security model, which has been further elaborated in the subsequent chapters of the book.