Get Free Shipping on orders over $79
IoT and OT Security Handbook : Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT - Smita Jain

IoT and OT Security Handbook

Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

By: Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa

eText | 30 March 2023 | Edition Number 1

At a Glance

eText


$42.89

or 4 interest-free payments of $10.72 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Understand common attacks and achieve zero trust for IoT and OT devices

Key Features

  • Identify and resolve cybersecurity challenges in IoT/OT world
  • Grasp common attack vectors in IoT and OT domain
  • Dive into Defender for IoT, understand its capabilities, and put it to practice

Book Description

The fourth industrial revolution (Industry 4.0) is about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book will take you through IoT and OT Architecture basics and help you understand and mitigate security challenges.

The book starts with an overview of security challenges in IoT and OT devices in Industry 4.0. Understanding the Purdue model of reference architecture, you will dive into the common cyber attacks on IoT and OT environments. As you progress further, you will be introduced to Microsoft Defender for IoT and you will understand its capabilities in securing IoT and OT environments. Finally, you will learn best practices to achieve continuous monitoring, vulnerability management, threat monitoring and hunting, and to align the business model towards Zero Trust.

By the end of this book, you will have a good understanding of securing IoT and OT environments with Microsoft Defender for IoT.

What you will learn

  • Discover security challenges in IoT/OT environments
  • Understand the security issues in Industry 4.0
  • Understand Microsoft Defender for IoT and how it aids in securing IoT-OT industry
  • Learn about deploying Microsoft Defender for IoT and its prerequisites
  • Explore the importance of continuous monitoring
  • Learn vulnerability management in IoT/OT world
  • Dive into risk assessment, threat monitoring, and hunting
  • Achieve zero trust for IoT devices

Who This Book Is For

This book is for industrial and IoT security professionals who wish to explore Microsoft Defender for IoT.

Table of Contents

  1. Addressing Cybersecurity in the Age of Industry 4.0
  2. Delving into Network Segmentation-based Reference Architecture - Purdue Model
  3. Common Attacks on IOT/OT Environment
  4. What is Defender for IOT?
  5. How Defender for IOT Fits in Your Environment - Architecture?
  6. How Do Defender for IOT Features help in Addressing the Open Challenges?
  7. Asset Inventory
  8. Continuous Monitoring
  9. Vulnerability Management and Threat Monitoring
  10. Best Practices to Achieve Zero Trust and Align the Security Strategy to NIST Cybersecurity Framework
on
Desktop
Tablet
Mobile

More in Operating Systems

ReFormat : Windows 11 - Adam Natad

eBOOK

Hugging Face in Action - Wei-Meng Lee

eBOOK