- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 107字
- 2021-07-02 23:59:26
Security considerations for the implementation viewpoint
End-to-end security includes securing both IT and OT realms and their integration points.
Securing legacy systems includes securing legacy endpoints, systems, and data transmission in order to minimize the risks of an attack on the older systems. Each architectural pattern has its own unique sets of risks and areas to secure, including end points, information exchange, management and control, and data distribution and storage.
End-point security embeds security in the devices itself, enabling them to protect themselves while disconnected from any central security management systems. Information exchange security protects communication and data exchanges, ensuring that the data remains private and authentic.
推薦閱讀
- 從零構建知識圖譜:技術、方法與案例
- Web應用系統開發實踐(C#)
- 假如C語言是我發明的:講給孩子聽的大師編程課
- QGIS:Becoming a GIS Power User
- Learn React with TypeScript 3
- 機器學習與R語言實戰
- Windows Embedded CE 6.0程序設計實戰
- 快速入門與進階:Creo 4·0全實例精講
- JBoss:Developer's Guide
- Python計算機視覺和自然語言處理
- Delphi開發典型模塊大全(修訂版)
- 零基礎輕松學C++:青少年趣味編程(全彩版)
- Hack與HHVM權威指南
- MATLAB 2020 GUI程序設計從入門到精通
- 算法超簡單:趣味游戲帶你輕松入門與實踐