Getting Started with Enterprise Internet of Things: Design Approaches and Software Architecture Models by L. S. Jayashree & G. Selvakumar

Getting Started with Enterprise Internet of Things: Design Approaches and Software Architecture Models by L. S. Jayashree & G. Selvakumar

Author:L. S. Jayashree & G. Selvakumar
Language: eng
Format: epub
ISBN: 9783030309459
Publisher: Springer International Publishing


4.3.1 Security Standards

Almost all the IoT devices used today have vulnerabilities and the most important challenge to be faced by the enterprises are the cyber security. Security breaches in the domestic sector such as smart home solutions are implications in the personal privacy. However, in Industrial IoT systems where there are numerous sensors connected to critical resources of the industry the repercussions are extremely high. Take the case of a nuclear power plant or overseas logistics solutions, where the lack of security would cost enormous loss of wealth and it is a danger to national security also. A compromised water management system or some similar smart city solution of a town would stop the daily livelihood of thousands of families and it would cause severe business losses too. A small interruption would cost millions of dollars in a high-volume manufacturing industry if there is a security compromise. If the small electrical grid is hacked, it will directly affect the economic activity for millions of people, companies and it is a great danger to the public security. Thus, Security is critical in Enterprise IoT solutions when compared to the consumer IoT solutions. To face the security related challenges, Enterprise solutions make use of a variety of sophisticated security measures, from resilient system architectures to highly effective business processes. Threat detection, encryption and authentication technologies and other means of security are followed religiously in every part of Enterprise IoT solution.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.