Foreword |
|
xxvii | |
Introduction |
|
xxix | |
Part I Introduction to the Internet of Things (IoT) and IoT Security |
|
|
Chapter 1 Evolution of the Internet of Things (IoT) |
|
|
1 | (10) |
|
Defining the Internet of Things |
|
|
2 | (3) |
|
Making Technology and Architectural Decisions |
|
|
5 | (3) |
|
Is the Internet of Things Really So Vulnerable? |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Chapter 2 Planning for IoT Security |
|
|
11 | (20) |
|
|
11 | (2) |
|
The IoT System and Security Development Lifecycle |
|
|
13 | (4) |
|
|
15 | (1) |
|
Phase 2: Acquisition and Development |
|
|
15 | (1) |
|
|
16 | (1) |
|
Phase 4: Operations and Maintenance |
|
|
17 | (1) |
|
|
17 | (1) |
|
The End-to-End Considerations |
|
|
17 | (4) |
|
Segmentation, Risk, and How to Use Both in Planning the Consumer/Provider Communications Matrix |
|
|
21 | (9) |
|
|
21 | (4) |
|
|
25 | (5) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Chapter 3 IoT Security Fundamentals |
|
|
31 | (18) |
|
The Building Blocks of IoT |
|
|
31 | (4) |
|
|
35 | (2) |
|
|
37 | (6) |
|
|
43 | (3) |
|
|
46 | (1) |
|
|
47 | (2) |
|
Chapter 4 IoT and Security Standards and Best Practices |
|
|
49 | (34) |
|
Today's Standard Is No Standard |
|
|
49 | (4) |
|
|
53 | (3) |
|
The Challenge with Standardization |
|
|
56 | (2) |
|
IoT "Standards" and "Guidance" landscape |
|
|
58 | (5) |
|
Architectural or Reference Standards |
|
|
59 | (2) |
|
Industrial/Market Focused |
|
|
61 | (2) |
|
Standards for NFV, SDN, and Data Modeling for Services |
|
|
63 | (7) |
|
Data Modeling and Services |
|
|
67 | (3) |
|
Communication Protocols for IoT |
|
|
70 | (5) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Specific Security Standards and Guidelines |
|
|
75 | (4) |
|
|
79 | (1) |
|
|
80 | (3) |
|
Chapter 5 Current IoT Architecture Design and Challenges |
|
|
83 | (102) |
|
What, Why, and Where? A Summary |
|
|
85 | (3) |
|
Approaches to IoT Architecture Design |
|
|
88 | (32) |
|
|
91 | (7) |
|
The People-/User-Centric IoT Approach (Internet of People and Social IoT) |
|
|
98 | (2) |
|
The Information-Centric IoT Approach |
|
|
100 | (4) |
|
The Data-Centric IoT Approach |
|
|
104 | (2) |
|
System Viewpoint: A Cloudy Perspective |
|
|
106 | (12) |
|
|
106 | (6) |
|
|
112 | (6) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (24) |
|
Internet of Things Architecture Reference Architecture (IoT-A RA) |
|
|
120 | (5) |
|
|
125 | (1) |
|
IoT World Forum (IoTWF) Reference Model |
|
|
126 | (3) |
|
oneM2M Reference Architecture |
|
|
129 | (3) |
|
|
P2413 | |
|
|
132 | (1) |
|
The OpenFog Consortium Reference Architecture |
|
|
133 | (5) |
|
Alliance for the Internet of Things Innovation (AIOTI) |
|
|
138 | (2) |
|
Cloud Customer Architecture for IoT |
|
|
140 | (2) |
|
Open Connectivity Foundation and IoTivity |
|
|
142 | (2) |
|
Industrial/Market Focused |
|
|
144 | (10) |
|
The Industrial Internet Consortium (IIC) |
|
|
144 | (4) |
|
|
148 | (2) |
|
OPC Unified Architecture (OPC UA) |
|
|
150 | (3) |
|
Cisco and Rockwell Automation Converged Plantwide Ethernet |
|
|
153 | (1) |
|
Cisco Smart Grid Reference Model: GridBlocks |
|
|
153 | (1) |
|
NFV- and SDN-Based Architectures for IoT |
|
|
154 | (2) |
|
Approaches to IoT Security Architecture |
|
|
156 | (16) |
|
Purdue Model of Control Hierarchy Reference Model |
|
|
157 | (3) |
|
Industrial Internet Security Framework (IISF) IIC Reference Architecture |
|
|
160 | (5) |
|
Cloud Security Alliance Security Guidance for IoT |
|
|
165 | (3) |
|
Open Web Application Security Project (OWASP) |
|
|
168 | (1) |
|
Cisco IoT Security Framework |
|
|
168 | (4) |
|
The IoT Platform Design of Today |
|
|
172 | (11) |
|
Security for IoT Platforms and Solutions |
|
|
178 | (1) |
|
Challenges with Today's Designs: The Future for IoT Platforms |
|
|
179 | (4) |
|
|
183 | (1) |
|
|
183 | (2) |
Part II Leveraging Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for IoT |
|
|
Chapter 6 Evolution and Benefits of SDX and NFV Technologies and Their Impact on IoT |
|
|
185 | (66) |
|
A Bit of History on SDX and NFV and Their Interplay |
|
|
185 | (3) |
|
Software-Defined Networking |
|
|
188 | (29) |
|
|
192 | (3) |
|
|
195 | (3) |
|
|
198 | (3) |
|
Programming Protocol-Independent Packet Processors (P4) |
|
|
201 | (2) |
|
|
203 | (9) |
|
Extending the Concept of Software-Defined Networks |
|
|
212 | (5) |
|
Network Functions Virtualization |
|
|
217 | (18) |
|
Virtual Network Functions and Forwarding Graphs |
|
|
221 | (4) |
|
ETSI NFV Management and Orchestration (MANO) |
|
|
225 | (10) |
|
The Impact of SDX and NFV in IoT and Fog Computing |
|
|
235 | (13) |
|
|
248 | (1) |
|
|
249 | (2) |
|
Chapter 7 Securing SDN and NFV Environments |
|
|
251 | (36) |
|
Security Considerations for the SDN Landscape |
|
|
251 | (21) |
|
1 Securing the Controller |
|
|
252 | (4) |
|
Securing the Controller Application |
|
|
252 | (1) |
|
Securing the Underlying Operating System |
|
|
253 | (1) |
|
Securing the Controller East-West Communications |
|
|
254 | (2) |
|
2 Securing Controller Southbound Communications |
|
|
256 | (4) |
|
Authentication and Encryption |
|
|
258 | (1) |
|
Leveraging Inherent Protocol Security Options |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
3 Securing the Infrastructure Planes |
|
|
260 | (3) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
4 Securing Controller Northbound Communications |
|
|
263 | (5) |
|
|
264 | (3) |
|
|
267 | (1) |
|
|
267 | (1) |
|
5 Securing Management and Orchestration |
|
|
268 | (2) |
|
6 Securing Applications and Services |
|
|
270 | (2) |
|
Security Considerations for the NFV Landscape |
|
|
272 | (13) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Private Keys Within Cloned Images |
|
|
276 | (2) |
|
|
278 | (1) |
|
Tenant/User Authentication, Authorization, and Accounting (AAA) |
|
|
279 | (2) |
|
Authenticated Time Service |
|
|
281 | (1) |
|
Back Doors with Test and Monitor Functions |
|
|
281 | (1) |
|
Multi-administrator Isolation |
|
|
282 | (1) |
|
Single Root I/O Virtualization (SRIOV) |
|
|
283 | (2) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (2) |
|
Chapter 8 The Advanced IoT Platform and MANO |
|
|
287 | (36) |
|
Next-Generation IoT Platforms: What the Research Says |
|
|
287 | (4) |
|
Next-Generation IoT Platform Overview |
|
|
291 | (17) |
|
|
294 | (1) |
|
|
295 | (8) |
|
Platform Intended Outcomes: Delivering Capabilities as an Autonomous End-to-End Service |
|
|
303 | (5) |
|
Model-Driven and Service-Centric |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
307 | (1) |
|
Example Use Case Walkthrough |
|
|
308 | (13) |
|
Event-Based Video and Security Use Case |
|
|
309 | (15) |
|
|
315 | (1) |
|
|
316 | (3) |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
321 | (2) |
Part III Security Services: For the Platform, by the Platform |
|
|
Chapter 9 Identity, Authentication, Authorization, and Accounting |
|
|
323 | (94) |
|
Introduction to Identity and Access Management for the IoT |
|
|
324 | (12) |
|
Device Provisioning and Access Control Building Blocks |
|
|
326 | (1) |
|
Naming Conventions to Establish "Uniqueness" |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
Bootstrapping Remote Secure Key Infrastructures |
|
|
329 | (1) |
|
Device Registration and Profile Provisioning |
|
|
330 | (1) |
|
Provisioning Example Using AWS IoT |
|
|
331 | (3) |
|
Provisioning Example Using Cisco Systems Identity Services Engine |
|
|
334 | (2) |
|
|
336 | (15) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
337 | (3) |
|
|
340 | (5) |
|
Methods to Gain Identity from Constrained Devices |
|
|
345 | (1) |
|
|
346 | (1) |
|
Strategy for Using Power for Communication |
|
|
347 | (1) |
|
Leveraging Standard IoT Protocols to Identify Constrained Devices |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (16) |
|
|
351 | (4) |
|
|
352 | (1) |
|
|
353 | (1) |
|
Private Key Infrastructure |
|
|
353 | (2) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
Limitations for Constrained Devices |
|
|
358 | (1) |
|
|
359 | (2) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
366 | (1) |
|
Dynamic Authorization Privileges |
|
|
367 | (23) |
|
Cisco Identity Services Engine and TrustSec |
|
|
368 | (1) |
|
RADIUS Change of Authorization |
|
|
368 | (3) |
|
|
368 | (1) |
|
CoA Request/Response Code |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (3) |
|
|
374 | (2) |
|
TrustSec and Security Group Tags |
|
|
376 | (3) |
|
|
377 | (1) |
|
|
378 | (1) |
|
Dynamic Segmentation Based on RBAC |
|
|
378 | (1) |
|
|
379 | (5) |
|
|
380 | (1) |
|
|
381 | (2) |
|
Inline Tagging Mediums (Ethernet and L3 Crypto) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (6) |
|
|
384 | (2) |
|
SGACL for North-South and East-West |
|
|
386 | (2) |
|
Automation of SGACLs and Dynamic Segmentation |
|
|
388 | (2) |
|
Manufacturer Usage Description |
|
|
390 | (4) |
|
|
390 | (1) |
|
|
390 | (2) |
|
|
392 | (2) |
|
AWS Policy-based Authorization with IAM |
|
|
394 | (3) |
|
|
395 | (1) |
|
|
395 | (1) |
|
Policy-based Authorization |
|
|
395 | (2) |
|
|
397 | (5) |
|
How Does Accounting Relate to Security? |
|
|
398 | (1) |
|
Using a Guideline to Create an Accounting Framework |
|
|
398 | (2) |
|
Meeting User Accounting Requirements |
|
|
400 | (2) |
|
Scaling IoT Identity and Access Management with Federation Approaches |
|
|
402 | (9) |
|
|
403 | (1) |
|
OAuth 2.0 and OpenID Connect 1.0 |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
OAuth2.0 and OpenID Connect Example for IoT |
|
|
405 | (1) |
|
|
406 | (2) |
|
Native Applications to the Cloud |
|
|
408 | (1) |
|
|
409 | (2) |
|
Evolving Concepts: Need for Identity Relationship Management |
|
|
411 | (3) |
|
|
414 | (1) |
|
|
415 | (2) |
|
Chapter 10 Threat Defense |
|
|
417 | (82) |
|
Centralized and Distributed Deployment Options for Security Services |
|
|
418 | (4) |
|
|
418 | (2) |
|
|
419 | (1) |
|
|
420 | (2) |
|
|
422 | (1) |
|
Fundamental Network Firewall Technologies |
|
|
422 | (6) |
|
|
423 | (1) |
|
|
423 | (1) |
|
Network Address Translation |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
Overloading or Port Address Translation |
|
|
425 | (1) |
|
|
426 | (2) |
|
Industrial Protocols and the Need for Deeper Packet Inspection |
|
|
428 | (2) |
|
Common Industrial Protocol |
|
|
428 | (1) |
|
|
429 | (1) |
|
Potential Solutions: Not Good Enough |
|
|
430 | (1) |
|
Alternative Solution: Deep Packet Inspection |
|
|
430 | (3) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
Application Visibility and Control |
|
|
433 | (4) |
|
Industrial Communication Protocol Example |
|
|
435 | (1) |
|
MODBUS Application Filter Example |
|
|
436 | (1) |
|
Intrusion Detection System and Intrusion Prevention System |
|
|
437 | (3) |
|
|
438 | (1) |
|
|
438 | (1) |
|
|
439 | (1) |
|
|
439 | (1) |
|
Advanced Persistent Threats and Behavioral Analysis |
|
|
440 | (15) |
|
Behavior Analysis Solutions |
|
|
441 | (1) |
|
Protocols Used to Gain Additional Visibility |
|
|
442 | (2) |
|
|
442 | (2) |
|
|
444 | (1) |
|
Network-Based Application Recognition |
|
|
444 | (1) |
|
Network Security Event Logging |
|
|
444 | (1) |
|
|
444 | (2) |
|
Algorithms for Security Events |
|
|
445 | (1) |
|
Pairing with Contextual Information and Adaptive Network Control |
|
|
446 | (4) |
|
Cisco TrustSec Fields in Flexible NetFlow |
|
|
447 | (1) |
|
Anomaly Detection Example |
|
|
447 | (3) |
|
Encrypted Traffic Analytics |
|
|
450 | (5) |
|
Detecting Threats Using Encrypted Traffic Analytics |
|
|
451 | (3) |
|
|
454 | (1) |
|
|
454 | (1) |
|
Malware Protection and Global Threat Intelligence |
|
|
455 | (7) |
|
Cisco Advanced Malware Protection and TALOS |
|
|
456 | (6) |
|
Point-in-Time Detection, Retrospective Security, and Sandboxing |
|
|
456 | (3) |
|
Example of How the Firewall Uses the Malware Feature |
|
|
459 | (2) |
|
|
461 | (1) |
|
|
462 | (4) |
|
Umbrella (DNS Security + Intelligent Proxy) |
|
|
463 | (3) |
|
|
464 | (1) |
|
Umbrella + AMP Threat Grid |
|
|
465 | (1) |
|
Using Umbrella to Help Protect Healthcare |
|
|
465 | (1) |
|
Centralized Security Services Deployment Example Using NSO, ESC, and OpenStack |
|
|
466 | (20) |
|
ETSI MANO Components in the Use Case |
|
|
468 | (1) |
|
VMs (Services) Being Instantiated in the Use Case |
|
|
469 | (1) |
|
|
469 | (17) |
|
Activation Sequence Basics and NSO Service Creation (VNFD, NSD, and NSR) |
|
|
470 | (2) |
|
Activation Sequence Example |
|
|
472 | (2) |
|
Fulfillment and Assurance Sequences Basics |
|
|
474 | (1) |
|
|
475 | (1) |
|
Prerequisites for Monitoring |
|
|
475 | (1) |
|
Metrics and Actions and Dynamic Mapping |
|
|
475 | (3) |
|
Dynamic Mapping in the Data Model |
|
|
478 | (1) |
|
|
479 | (1) |
|
Fulfillment and Assurance Sequence Examples |
|
|
479 | (1) |
|
|
480 | (3) |
|
|
483 | (3) |
|
Distributed Security Services Deployment Example Using Cisco Network Function Virtualization Infrastructure Software (NFVIS) |
|
|
486 | (9) |
|
|
487 | (1) |
|
|
488 | (2) |
|
|
488 | (2) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (28) |
|
Service Chaining and Traffic Flow |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
495 | (4) |
|
Chapter 11 Data Protection in IoT |
|
|
499 | (76) |
|
|
507 | (11) |
|
|
518 | (6) |
|
|
521 | (1) |
|
|
522 | (2) |
|
|
524 | (3) |
|
|
527 | (4) |
|
|
531 | (42) |
|
Data Plane Protection in IoT |
|
|
531 | (34) |
|
Message Queuing Telemetry Transport Protocol |
|
|
532 | (1) |
|
|
533 | (2) |
|
|
535 | (4) |
|
|
539 | (1) |
|
|
540 | (2) |
|
|
542 | (1) |
|
|
543 | (1) |
|
|
544 | (3) |
|
Authentication in RabbitMQ |
|
|
547 | (1) |
|
Authorization in RabbitMQ |
|
|
548 | (1) |
|
Confidentiality in RabbitMQ |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
550 | (1) |
|
Other Considerations Related to Data Availability in RabbitMQ |
|
|
550 | (2) |
|
Nonrepudiation in RabbitMQ |
|
|
552 | (1) |
|
Example: Orchestrated Security on RabbitMQ at the Fog Node Level |
|
|
552 | (8) |
|
Cisco Edge and Fog Processing Module (EFM) |
|
|
560 | (4) |
|
Data Virtualization: Enabling Single Query Models in IoT |
|
|
564 | (1) |
|
Protecting Management Plane Data in IoT |
|
|
565 | (1) |
|
Protecting Control Plane Data |
|
|
566 | (1) |
|
Considerations When Planning for Data Protection |
|
|
567 | (6) |
|
|
573 | (1) |
|
|
574 | (1) |
|
Chapter 12 Remote Access and Virtual Private Networks (VPN) |
|
|
575 | (50) |
|
Virtual Private Network Primer |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
576 | (12) |
|
|
577 | (2) |
|
Authentication Header (AH) |
|
|
578 | (1) |
|
Encapsulating Security Payload (ESP) |
|
|
578 | (1) |
|
Internet Key Exchange (IKE) Overview |
|
|
578 | (1) |
|
|
579 | (3) |
|
|
579 | (1) |
|
Diffie-Hellman (D-H) Groups |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
IKE Modes (Main and Aggressive) |
|
|
580 | (2) |
|
|
582 | (1) |
|
|
582 | (2) |
|
|
583 | (1) |
|
Perfect Forward Secrecy (PFS) |
|
|
584 | (1) |
|
Internet Key Exchange Protocol Version 2 |
|
|
584 | (2) |
|
|
584 | (2) |
|
Benefits of IKEv2 over IKEv1 |
|
|
586 | (2) |
|
Software-Defined Networking-Based IPsec Flow Protection IETF Draft |
|
|
588 | (4) |
|
|
589 | (1) |
|
Use Case: IKE/IPsec Within the NSF |
|
|
589 | (1) |
|
|
590 | (2) |
|
Multiple Security Controllers |
|
|
591 | (1) |
|
Applying SDN-Based IPsec to IoT |
|
|
592 | (2) |
|
Leveraging SDN for Dynamic Decryption (Using IKE for Control Channels and IPsec for Data Channels) |
|
|
592 | (2) |
|
Software-Based Extranet Using Orchestration and NFV |
|
|
594 | (4) |
|
|
594 | (1) |
|
Automating Extranet Using Orchestration Techniques and NFV |
|
|
595 | (2) |
|
Software-Based Extranet Use Case |
|
|
597 | (1) |
|
|
598 | (24) |
|
SSL-Based Remote Access VPN |
|
|
598 | (1) |
|
SSL VPN for Multiple Solutions |
|
|
599 | (1) |
|
|
599 | (1) |
|
Clientless and Thin Client VPN |
|
|
599 | (12) |
|
Tunnel Groups and Group Policies |
|
|
600 | (2) |
|
|
602 | (1) |
|
|
602 | (2) |
|
Application Access (Bookmarks, Port Forwarding, Smart Tunnels) |
|
|
604 | (5) |
|
|
609 | (1) |
|
Clientless Example for IoT: Oil and Gas |
|
|
610 | (1) |
|
Client Based: Cisco AnyConnect Secure Mobility Client |
|
|
611 | (1) |
|
|
611 | (1) |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
612 | (5) |
|
|
612 | (2) |
|
Network Access Manager Module |
|
|
614 | (1) |
|
Endpoint Compliance Module |
|
|
614 | (1) |
|
Roaming Protection Module |
|
|
614 | (1) |
|
Network Visibility Module |
|
|
615 | (1) |
|
|
616 | (1) |
|
Using AnyConnect in Manufacturing: Use Case Example |
|
|
617 | (14) |
|
|
617 | (1) |
|
|
618 | (4) |
|
|
622 | (1) |
|
|
622 | (3) |
|
Chapter 13 Securing the Platform Itself |
|
|
625 | (44) |
|
Visualization Dashboards and Multitenancy |
|
|
627 | (4) |
|
|
631 | (27) |
|
Scenario 1: A New Endpoint Needs to Be Connected to the Network |
|
|
639 | (1) |
|
Scenario 2: A User Wants to Deploy a New Service Across the Fog, Network, and Data Center Infrastructure |
|
|
639 | (2) |
|
Scenario 3: Creating New Data Topics and Enabling Data Sharing Across Tenants |
|
|
641 | (12) |
|
|
653 | (3) |
|
Kubernetes Security and Best Practices |
|
|
656 | (2) |
|
Communications and Networking |
|
|
658 | (2) |
|
|
660 | (6) |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
667 | (2) |
Part IV Use Cases and Emerging Standards and Technologies |
|
|
|
669 | (60) |
|
|
669 | (1) |
|
The Evolving Technology Landscape for IoT |
|
|
670 | (2) |
|
The Next-Generation IoT Platform for Delivering Use Cases Across Verticals: A Summary |
|
|
672 | (4) |
|
|
676 | (2) |
|
|
678 | (10) |
|
The IoT and Secure Orchestration Opportunity in Cities |
|
|
688 | (5) |
|
|
693 | (3) |
|
Smart Cities Example Use Cases |
|
|
696 | (29) |
|
Use Case Automation Overview and High-Level Architecture |
|
|
701 | (1) |
|
Power Monitoring and Control Use Case: Secure Lifecycle Management of Applications in the Fog Nodes |
|
|
702 | (3) |
|
Access Control and Sensor Telemetry of City Cabinets: Simple and Complex Sensor Onboarding |
|
|
705 | (4) |
|
|
708 | (1) |
|
Event-Based Video: Secure Data Pipeline and Information Exchange |
|
|
709 | (5) |
|
Public Service Connectivity on Demand: Secure User Access and Behavioral Analysis |
|
|
714 | (4) |
|
Emergency Fleet Integration |
|
|
718 | (3) |
|
Automated Deployment of the Use Cases |
|
|
721 | (4) |
|
|
725 | (2) |
|
|
727 | (2) |
|
Chapter 15 Industrial Environments: Oil and Gas |
|
|
729 | (68) |
|
|
733 | (2) |
|
The IoT and Secure Automation Opportunity in Oil and Gas |
|
|
735 | (3) |
|
|
738 | (6) |
|
Overview, Technologies, and Architectures |
|
|
739 | (3) |
|
Digitization and New Business Needs |
|
|
742 | (1) |
|
|
743 | (1) |
|
The Midstream Environment |
|
|
744 | (5) |
|
Overview, Technologies, and Architectures |
|
|
744 | (3) |
|
Digitization and New Business Needs |
|
|
747 | (1) |
|
|
748 | (1) |
|
The Downstream and Processing Environments |
|
|
749 | (5) |
|
Overview, Technologies, and Architectures |
|
|
749 | (3) |
|
Digitization and New Business Needs |
|
|
752 | (1) |
|
|
753 | (1) |
|
|
754 | (9) |
|
Oil and Gas Security and Automation Use Cases: Equipment Health Monitoring and Engineering Access |
|
|
763 | (25) |
|
|
763 | (2) |
|
|
765 | (2) |
|
|
767 | (6) |
|
Preconfiguration Checklist |
|
|
773 | (4) |
|
Automated Deployment of the Use Cases |
|
|
777 | (1) |
|
|
778 | (3) |
|
Security Use Case #1: Identifying, Authenticating, and Authorizing the Sensor for Network Use |
|
|
778 | (2) |
|
Security Use Case #2: Detecting Anomalous Traffic with Actionable Response |
|
|
780 | (1) |
|
|
781 | (1) |
|
Auto-Quarantine Versus Manual Quarantine |
|
|
782 | (1) |
|
Security Use Case #3: Ensuring That Contractors and Employees Adhere to Company Policy (Command Validation) |
|
|
782 | (1) |
|
Leveraging Orchestrated Service Assurance to Monitor KPIs |
|
|
783 | (26) |
|
Security Use Case #4: Securing the Data Pipeline |
|
|
786 | (2) |
|
Evolving Architectures to Meet New Use Case Requirements |
|
|
788 | (4) |
|
|
792 | (2) |
|
|
794 | (3) |
|
Chapter 16 The Connected Car |
|
|
797 | (76) |
|
|
800 | (9) |
|
The IoT and Secure Automation Opportunity for Connected Cars |
|
|
809 | (21) |
|
The Evolving Car Architecture |
|
|
824 | (6) |
|
Security for Connected Cars |
|
|
830 | (19) |
|
Connected Car Vulnerabilities and Security Considerations |
|
|
838 | (11) |
|
Connected Car Security and Automation Use Case |
|
|
849 | (22) |
|
|
852 | (2) |
|
Use Case Automation Overview |
|
|
854 | (1) |
|
Secure Access/Secure Platform: Boundary Firewall for OTA Secure Updates |
|
|
855 | (2) |
|
Secure Network: Segmentation, Zones, and Interzone Communication |
|
|
857 | (1) |
|
Secure Content: Intrusion Detection and Prevention |
|
|
858 | (3) |
|
Secure Intelligence: Secure Internet Access from the Vehicle |
|
|
861 | (1) |
|
The Future: Personalized Experience Based on Identity |
|
|
862 | (1) |
|
Federal Sigma VAMA: Emergency Fleet Solution |
|
|
863 | (4) |
|
Automated Deployment of the Use Case |
|
|
867 | (4) |
|
|
871 | (1) |
|
|
871 | (2) |
|
Chapter 17 Evolving Concepts That Will Shape the Security Service Future |
|
|
873 | (30) |
|
A Smarter, Coordinated Approach to IoT Security |
|
|
876 | (4) |
|
|
880 | (8) |
|
Blockchain for IoT Security |
|
|
888 | (2) |
|
Machine Learning and Artificial Intelligence Overview |
|
|
890 | (3) |
|
|
893 | (1) |
|
|
894 | (1) |
|
Natural Language Processing and Understanding |
|
|
895 | (1) |
|
|
896 | (2) |
|
|
898 | (2) |
|
|
898 | (1) |
|
|
898 | (1) |
|
|
899 | (1) |
|
Machine Learning and Artificial Intelligence for IoT Security |
|
|
899 | (1) |
|
|
900 | (1) |
|
|
901 | (2) |
Index |
|
903 | |