Cookies auf den Omega Webseiten
Wir verwenden Cookies auf unserer Webseite. Diese Cookies sind für die ordnungsgemäße Funktion der Webseite unerlässlich. Wenn Sie fortfahren, ohne Ihre Einstellungen zu ändern, gehen wir davon aus, dass Sie alle Cookies auf dieser Webseite akzeptieren.Um weitere Informationen zu diesen Cookies zu erhalten, klicken Sie bitte hier.
SCHLIESSEN
Einkaufswagen  |  Kontakt  | 
Deutschland 07056-9398-0
Internationale Rufnummer++49 (0) 7056-9398-0

IIoT Security

IIoT solutions must be trusted to provide data and information with integrity, as they are monitoring and measuring business critical systems and environments. That trust is verified by ensuring the system is secure against threats. Threat modeling is the best approach to designing for security. Using a typical IIoT solution configuration, we can identify several zones (Figure 1.0). The boundaries of these zones are where data and information transition from one solution element to another. Threats will be against the boundaries of these zones.


short-image-description

For the threat analysis we use the STRIDE model, which defines threats using the categories in the table below.

short-image-description

Applying the STRIDE model to the security zones identified above, we can generate a table similar to the one below. This is a simplified version of a much longer table that shows the security zone, the type of threat against it, and how that threat could be mitigated.

short-image-description

VERWANDTE THEMEN
IIoT
We noticed you are from the US. Visit your local site for regional offers and live support.