Cover Image
市場調查報告書

安全爭議:連網型企業的需求擴大

The Safety-Security Argument - Expanding Needs in a Connected Enterprise

出版商 Frost & Sullivan 商品編碼 338414
出版日期 內容資訊 英文 91 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
安全爭議:連網型企業的需求擴大 The Safety-Security Argument - Expanding Needs in a Connected Enterprise
出版日期: 2015年08月25日 內容資訊: 英文 91 Pages
簡介

本報告以工業自動化、流程控制的IoIT (Internet of Industrial Thing) 作為調查組合的一環,提供網路安全必要條件和最佳業務實踐相關策略性預測調查分析、製造業的課題、機會、策略等相關的系統性資訊。

第1章 摘要整理

第2章 IoIT (Internet of Industrial Thing)

第3章 調查範圍、目的、區分

第4章 產業現狀

  • APT、產業安全
  • ICS安全現況
  • ICS攻擊類型
  • 關於新的風險形勢
  • ICS安全狀況

第5章 IoIT和產業網路安全

  • 簡介
  • IoIT的主要零組件和廠商必要條件
  • 主要產業網路的影響
  • 智慧裝置和網路安全
  • 終端安全的影響
  • IoIT與產業網路
  • EDGE

第6章 有備無患:IoIT生態系統的網路安全解決方案的演進

  • 智慧工廠的主要技術
  • 巨量資料、分析、網路安全
  • 巨量資料分析的機會
  • 巨量資料分析的解決方案
  • 網路安全與雲端
  • 雲端使用的影響
  • 雲端基礎的網路安全的機會

第7章 讀產業預測:數位的足跡解

  • 未來的工廠
  • 安全的課題
  • 案例:汽車產業
  • 重要基礎設施產業
  • 重要基礎設施產業上安全的課題
  • 案例:電力產業
  • 安全的機會

第8章 策略性考察:T2 (Trust and Trap) 安全架構

第9章 結論

第10章 關於Frost&Sullivan

目錄
Product Code: MB1B-01-00-00-00

The Quest for a Trusted and Secure IoIT Ecosystem will Result in an End-user Push Toward Advanced Solutions

As part of the Internet of Industrial Things (IoIT) research portfolio from the Industrial Automation and Process Control practice, this study provides a strategic outlook of cyber security requirements and best practices in a new era of connected assets and connected enterprises. It includes key challenges in the manufacturing industry due to advanced persistent threats as well as opportunities and strategies for cybersecurity value chain participants and solution providers. The report details the current state of the industry and throws light on the trends that are expected to change, providing various perspectives that help decipher the digital footprints.

Table of Contents

1. EXECUTIVE SUMMARY

Executive Summary

  • 1. Market Outlook
  • 2. Market Outlook (continued)
  • 3. Key Findings and Inferences-Regional Perspective
  • 4. Key Findings and Inferences-Technology Perspective
  • 5. Key Findings and Inferences-Customer Perspective
  • 6. Key Findings and Inferences-Economic Perspective

2. INTERNET OF INDUSTRIAL THINGS-A RESEARCH PERSPECTIVE

Internet of Industrial Things-A Research Perspective

  • 1. Internet of Industrial Things-The 4 Functional Facets
  • 2. Relevant Research

3. RESEARCH SCOPE, OBJECTIVES, SEGMENTATION

Research Scope, Objectives, Segmentation

  • 1. Research Scope and Objective
  • 2. Key Questions this Study will Answer
  • 3. Definitions

4. CURRENT STATE OF THE INDUSTRY

Current State of the Industry

  • 1. APTs and Industrial Security
  • 2. Present State of ICS Security
  • 3. ICS Attack Types
  • 4. Understanding the New Risk Landscape
  • 5. Understanding the New Risk Landscape (continued)
  • 6. The State of ICS Security-An Industry Perspective
  • 7. The State of ICS Security-A Regulatory Perspective

5. IOIT AND INDUSTRIAL CYBER SECURITY

IoIT and Industrial Cyber Security

  • 1. Introduction-IoIT and Industrial Cyber Security
  • 2. Key Components of the IoIT and Manufacturing Requirements
  • 3. Key Industrial Network Implications
  • 4. Smart Devices and Cyber Security
  • 5. Endpoint Security Implications
  • 6. IoIT and the Industrial Networks
  • 7. IoIT and the Industrial Networks (continued)
  • 8. Understanding the ‘EDGE'-Industrial Networks

6. A STITCH IN TIME SAVES NINE-EVOLVING CYBER SECURITY SOLUTIONS IN THE IOIT ECOSYSTEM

A Stitch in Time Saves Nine-Evolving Cyber Security Solutions in the IoIT Ecosystem

  • 1. Key Technologies in Smart Factories
  • 2. Big Data, Analytics, and Cyber Security
  • 3. Big Data and Analytics Opportunities
  • 4. Big Data and Analytics Solutions
  • 5. Cyber Security and the Cloud
  • 6. Implications of Using the Cloud
  • 7. Cloud-based Cyber Security Opportunities
  • 8. Cloud-based Cyber Security Opportunities (continued)

7. INDUSTRY PERSPECTIVES-DECIPHERING DIGITAL FOOTPRINTS

Industry Perspectives-Deciphering Digital Footprints

  • 1. Factories of the Future
  • 2. Security Challenges in the Factory of the Future
  • 3. Case Example-Automotive Industry
  • 4. Critical Infrastructure Industries
  • 5. Security Challenges in Critical Infrastructure Industries
  • 6. Case Example-Power Industry
  • 7. Security Opportunities-Factories of the Future

8. STRATEGIC INSIGHTS-THE T2 (TRUST AND TRAP) SECURITY FRAMEWORK

Strategic Insights-The T2 (Trust and Trap) Security Framework

  • 1. Develop a New Trust Model
  • 2. Set the Security ‘TRAP'
  • 3. Top Trends in the Industrial Cyber Security Market
  • 4. The ICS Security Ecosystem
  • 5. Tactical Technical Approach to a Strategic Balanced Approach
  • 6. Defense-by-design-In-built Security Solutions
  • 7. Taking a Strategic Partnership Approach
  • 8. In-built Security Solutions-Creation of the Trust Network
  • 9. Opportunity Mapping-Creating a New Trust Model
  • 10. Cyber Security Services
  • 11. Cyber Security Services (continued)
  • 12. Security-A Safety Issue
  • 13. Security as a Service (SaaS)
  • 14. Emergence of the Totally Integrated Security Provider
  • 15. Opportunity Mapping-Developing Cyber SaaS
  • 16. The Safety-Security Continuum
  • 17. From SIL to SAL-Developing a Safety-based Security Framework
  • 18. Opportunity Mapping-The Safety-to-security Approach
  • 19. ATPs and ICS Networks
  • 20. Present State of ICS Security
  • 21. Key Solutions Required to Address ATPs
  • 22. Applied Security Intelligence
  • 23. Future Cyber Security Solutions
  • 24. Opportunity Mapping-The New Portfolio of ICS Security Solutions
  • 25. Emergence of the Digital Engineer
  • 26. Emergence of the Digital Engineer (continued)
  • 27. Digital Engineers in the ICS Ecosystem
  • 28. Opportunity Mapping-The New Age Workforce

9. CONCLUSION

Conclusion

  • 1. Future Cyber Security Solutions
  • 2. Trust and Trap (T2)-Keeping Security Simple
  • 3. Legal Disclaimer

10. THE FROST & SULLIVAN STORY

The Frost & Sullivan Story

  • 1. The Frost & Sullivan Story
  • 2. Value Proposition: Future of Your Company & Career
  • 3. Industry Convergence
  • 4. Global Perspective
  • 5. 360° Research Perspective
  • 6. Implementation Excellence
  • 7. Our Blue Ocean Strategy
Back to Top