- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 107字
- 2021-07-02 23:59:26
Security considerations for the implementation viewpoint
End-to-end security includes securing both IT and OT realms and their integration points.
Securing legacy systems includes securing legacy endpoints, systems, and data transmission in order to minimize the risks of an attack on the older systems. Each architectural pattern has its own unique sets of risks and areas to secure, including end points, information exchange, management and control, and data distribution and storage.
End-point security embeds security in the devices itself, enabling them to protect themselves while disconnected from any central security management systems. Information exchange security protects communication and data exchanges, ensuring that the data remains private and authentic.
推薦閱讀
- 大學(xué)計(jì)算機(jī)基礎(chǔ)(第三版)
- Python數(shù)據(jù)可視化:基于Bokeh的可視化繪圖
- Vue.js前端開發(fā)基礎(chǔ)與項(xiàng)目實(shí)戰(zhàn)
- Python從菜鳥到高手(第2版)
- 實(shí)戰(zhàn)Java程序設(shè)計(jì)
- Mastering matplotlib
- Mastering C# Concurrency
- Scratch真好玩:教小孩學(xué)編程
- AIRIOT物聯(lián)網(wǎng)平臺(tái)開發(fā)框架應(yīng)用與實(shí)戰(zhàn)
- 微信小程序開發(fā)與實(shí)戰(zhàn)(微課版)
- Frank Kane's Taming Big Data with Apache Spark and Python
- JavaScript應(yīng)用開發(fā)實(shí)踐指南
- INSTANT Silverlight 5 Animation
- Learning Node.js for .NET Developers
- jMonkeyEngine 3.0 Beginner’s Guide