- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 293字
- 2021-06-10 18:42:19
Defining cyber-physical systems
Cyber-Physical Systems (CPSes) are a huge, overlapping subset of the IoT. They fuse a broad range of engineering disciplines, each with a historically well-defined scope that includes the essential theory, lore, application, and relevant subject matter needed by their respective practitioners. These topics include engineering dynamics, fluid dynamics, thermodynamics, control theory, digital design, and many others. So, what is the difference between IoT and CPS? Borrowing from the IEEE, the principal difference is that a CPS—comprising connected sensors, actuators, monitoring and control systems—does not necessarily have to be connected to the internet. A CPS can be isolated from the internet and still achieve its business objective. From a communications perspective, the IoT is comprised of things that, necessarily and by definition, are connected to the internet and, through some aggregation of applications, achieve some business objective:
It is worthwhile to think of the IoT as a super-set of CPSes, as CPSes can be enveloped into the IoT simply by connectivity to the internet. A CPS is generally a rigorously engineered system designed for safety, security, availability, and functionality. Emergent enterprise IoT deployments should take note of the lessons learned through the engineering rigor associated with CPSes. For more information on building resilient CPSes, consult the National Institute of Standards and Technology (NIST) Framework for Cyber Physical Systems (https://s3.amazonaws.com/nist-sgcps/cpspwg/files/pwgglobal/CPS_PWG_Framework_for_Cyber_Physical_Systems_Release_1_0Final.pdf) and its related efforts to the IoT-Enabled Smart Cities Framework and others (https://www.nist.gov/el/cyber-physical-systems).
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 工業(yè)互聯(lián)網(wǎng)安全
- Metasploit Penetration Testing Cookbook(Second Edition)
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- API安全技術(shù)與實(shí)戰(zhàn)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測(cè)實(shí)施指南
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)
- 5G網(wǎng)絡(luò)安全規(guī)劃與實(shí)踐
- Hands-On Bug Hunting for Penetration Testers
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐
- 反黑風(fēng)暴:黑客社會(huì)工程學(xué)攻防演練