万本电子书0元读

万本电子书0元读

顶部广告

Practical Industrial Internet of Things Security电子书

售       价:¥

4人正在读 | 0人评论 9.8

作       者:Sravani Bhattacharjee

出  版  社:Packt Publishing

出版时间:2018-07-30

字       数:46.4万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Over 60 recipes to help you design interactive, smart, and cross-platform GUI applications Key Features * Get succinct QT solutions to pressing GUI programming problems in Python * Learn how to effectively implement reactive programming * Build customized applications that are robust and reliable Book Description PyQt is one of the best cross-platform interface toolkits currently available; it's stable, mature, and completely native. If you want control over all aspects of UI elements, PyQt is what you need. This book will guide you through every concept necessary to create fully functional GUI applications using PyQt, with only a few lines of code. As you expand your GUI using more widgets, you will cover networks, databases, and graphical libraries that greatly enhance its functionality. Next, the book guides you in using Qt Designer to design user interfaces and implementing and testing dialogs, events, the clipboard, and drag and drop functionality to customize your GUI. You will learn a variety of topics, such as look and feel customization, GUI animation, graphics rendering, implementing Google Maps, and more. Lastly, the book takes you through how Qt5 can help you to create cross-platform apps that are compatible with Android and iOS. You will be able to develop functional and appealing software using PyQt through interesting and fun recipes that will expand your knowledge of GUIs What you will learn * Use basic Qt components, such as a radio button, combo box, and sliders * Use QSpinBox and sliders to handle different signals generated on mouse clicks * Work with different Qt layouts to meet user interface requirements * Create custom widgets and set up customizations in your GUI * Perform asynchronous I/O operations and thread handling in the Python GUI * Employ network concepts, internet browsing, and Google Maps in UI * Use graphics rendering and implement animation in your GUI * Make your GUI application compatible with Android and iOS devices Who this book is for If you’re an intermediate Python programmer wishing to enhance your coding skills by writing powerful GUIs in Python using PyQT, this is the book for you.
目录展开

Title Page

Copyright and Credits

Practical Industrial Internet of Things Security

Dedication

Packt Upsell

Why subscribe?

PacktPub.com

Foreword

Contributors

About the author

About the reviewer

Packt is searching for authors like you

Disclaimer

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

An Unprecedented Opportunity at Stake

Defining the Industrial IoT

Industrial IoT, Industrial Internet, and Industrie 4.0

Consumer versus Industrial IoT

Industrial IoT security – a business imperative

Cybersecurity versus cyber-physical IoT security

What is a cyber-physical system?

Industrial "things," connectivity, and operational technologies

Operational technology

Machine-to-Machine

An overview of SCADA, DCS, and PLC

Industrial control system architecture

ICS components and data networks

ICS network components

Fieldbus protocols

IT and OT convergence – what it really means

Industrial IoT deployment architecture

Divergence in IT and OT security fundamentals

Operational priorities

Attack surface and threat actors

Interdependence of critical infrastructures

Industrial threats, vulnerabilities, and risk factors

Threats and threat actors

Vulnerabilities

Policy and procedure vulnerabilities

Platform vulnerabilities

Software platform vulnerabilities

Network vulnerability

Risks

Evolution of cyber-physical attacks

Industrial IoT use cases – examining the cyber risk gap

Energy and smart grids

Manufacturing

Cyberattack on industrial control systems – Stuxnet case study

Event flow

Key points

Risk gap summary

Smart city and autonomous transportation

Healthcare and pharmaceuticals

The ransomware attack on the healthcare enterprise – "WannaCry" case study

Cyber risk gap summary

Summary

Industrial IoT Dataflow and Security Architecture

Primer on IIoT attacks and countermeasures

Attack surfaces and attack vectors

OWASP IoT attack surfaces

Attack trees

Fault tree analysis

Threat modeling

STRIDE threat model

DREAD threat model

Trustworthiness of an IIoT system

Industrial big data pipeline and architectures

Industrial IoT security architecture

Business viewpoint

Usage viewpoint

Functional viewpoint

Implementation viewpoint

IIoT architecture patterns

Pattern 1 – Three-tier architectural model

Pattern 2 – Layered databus architecture

Building blocks of industrial IoT security architecture

A four-tier IIoT security model

Summary

IIoT Identity and Access Management

A primer on identity and access control

Identification

Authentication

Authorization

Account management

Distinguishing features of IAM in IIoT

Diversity of IIoT endpoints

Resource-constrained and brownfield considerations

Physical safety and reliability

Autonomy and scalability

Event logging is a rarity

Subscription-based models

Increasing sophistication of identity attacks

Risk-based access control policy

Identity management across the device lifecycle

Authentication and authorization frameworks for IIoT

Password-based authentication

Biometrics

Multi-factor authentication

Key-based authentication

Symmetric keys

Asymmetric keys

Zero-knowledge keys

Certificate-based authentication

Trust models – public key infrastructures and digital certificates

PKI certificate standards for IIoT

ITU-T X.509

IEEE 1609.2

Certificate management in IIoT deployments

Extending the OAuth 2.0 authorization framework for IoT access control

IEEE 802.1x

Identity support in messaging protocols

MQTT

CoAP

DDS

REST

Monitoring and management capabilities

Activity logging support

Revocation support and OCSP

Building an IAM strategy for IIoT deployment

Risk-based policy management

Summary

Endpoint Security and Trustworthiness

Defining an IIoT endpoint

Motivation and risk-based endpoint protection

Resource-constrained endpoint protection

Brownfield scenario considerations

Endpoint security enabling technologies

IIoT endpoint vulnerabilities

Case study – White hack exposes smart grid meter vulnerability

Use case

Developing the exploit

Demonstration

Establishing trust in hardware

Hardware security components

Root of trust – TPM, TEE, and UEFI

Securing secrets, or sealing

Endpoint identity and access control

Initialization and boot process integrity

Establishing endpoint trust during operations

Secure updates

A trustworthy execution ecosystem

Endpoint data integrity

Endpoint configuration and management

Endpoint visibility and control

Endpoint security using isolation techniques

Process isolation

Container isolation

Virtual isolation

Physical isolation

Endpoint physical security

Machine learning enabled endpoint security

Endpoint security testing and certification

Endpoint protection industry standards

Summary

Securing Connectivity and Communications

Definitions – networking, communications, and connectivity

Distinguishing features of IIoT connectivity

Deterministic behavior

Interoperability – proprietary versus open standards

Performance characteristics – latency, jitter, and throughput

Legacy networks with disappearing air gaps

Access to resource-constrained networks

Massive transition by connecting the unconnected

IIoT connectivity architectures

Multi-tier IIoT-secured connectivity architecture

Layered databus architecture

Controls for IIoT connectivity protection

Secure tunnels and VPNs

Cryptography controls

Network segmentation

Industrial demilitarized zones

Boundary defense with firewalls and filtering

Comprehensive access control

Core and edge gateways

Unidirectional gateway protection

Asset discovery, visibility, and monitoring

Physical security – the first line of defense

Security assessment of IIoT connectivity standards and protocols

Fieldbus protocols

Connectivity framework standards

Data Distribution Service

DDS security

oneM2M

oneM2M security

Open Platform Communications Unified Architecture (OPC UA)

OPC UA security

Web services and HTTP

Web services and HTTP security

Connectivity transport standards

Transmission Control Protocol (TCP)

TCP security

User Datagram Protocol (UDP)

UDP security

MQTT and MQTT-SN

MQTT security

Constrained Application Protocol (CoAP)

CoAP security

Advanced Message Queuing Protocol (AMQP)

Connectivity network standards

Data link and physical access standards

IEEE 802.15.4 WPAN

IEEE 802.11 wireless LAN

Cellular communications

Wireless wide area network standards

IEEE 802.16 (WiMAX)

LoRaWAN

Summary

Securing IIoT Edge, Cloud, and Apps

Defining edge, fog, and cloud computing

IIoT cloud security architecture

Secured industrial site

Secured edge intelligence

Secure edge cloud transport

Secure cloud services

Cloud security – shared responsibility model

Defense-in-depth cloud security strategy

Infrastructure security

Identity and access management

Application security

Microservice architecture

Container security

Credential store and vault

Data protection

Data governance

Data encryption

Key and digital certificate management

Securing the data life cycle

Cloud security operations life cycle

Business continuity plan and disaster recovery

Secure patch management

Security monitoring

Vulnerability management

Threat intelligence

Incident response

Secure device management

Cloud security standards and compliance

Case study of IIoT cloud platforms

Case study 1 – Predix IIoT platform

Case study 2 – Microsoft Azure IoT

Case study 3 – Amazon AWS IoT

Cloud security assessment

Summary

Secure Processes and Governance

Challenges of unified security governance

Securing processes across the IIoT life cycle

Business cases

System definitions

Development

Deployment

Evaluating security products

Operations

Understanding security roles

Solution provider

Hardware manufacturers

Industry governance

Solution owner

Elements of an IIoT security program

Risk assessment

Regulatory compliance

Security policy

Security monitoring

Security analysis

Incident response and management

Security audits

Security maturity model

Implementing an IIoT security program

Establishing an IIoT security team

Deciding on regulatory compliance

Assessing and managing risks

Managing third-party security

Enforcing the security policy

Continuous monitoring and analysis

Conducting security training

Implementing incident management

Defining security audits

Security revisions and maturity

Summary

IIoT Security Using Emerging Technologies

Blockchain to secure IIoT transactions

Public and private blockchains

Digital identity with blockchains

Securing the supply chain

Blockchain challenges

Cognitive countermeasures – AI, machine learning, and deep learning

Practical considerations for AI-based IIoT security

Time-sensitive networking – Next-gen industrial connectivity

Time synchronization

Traffic scheduling

Network and system configuration

TSN security

Other Promising Trends

Summary

Real-World Case Studies in IIoT Security

Analysis of a real-world cyber-physical attack

Background and impact

The sequence of events

Exploit loopholes to perform the attack

Trigger the attack with impact

Impair operations and delay recovery

Inside the attack anatomy

Reconnaissance

Spear phishing

Credential theft

Data exfiltration

Remote access exploit

Impair recovery – Malicious firmware, TDOS, and UPS failure

Cyber-physical defense – Lessons learned

Case study 2 – Building a successful IIoT security program

Background

Defining the security program

Implementation

Concluding remarks

Case study 3 – ISA/IEC 62443 based industrial endpoint protection

Background

Solution

Concluding remarks

Summary

The Road Ahead

An era of decentralized autonomy

Endpoint security

Standards and reference architecture

Industrial collaboration

Interoperability

Green patches in brownfield

Technology trends

Summary

I

II

Security standards – quick reference

Device endpoint security

Industrial connectivity infrastructure security

Edge-cloud security

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部