Professional Documents
Culture Documents
UNIT 2-Final Year
UNIT 2-Final Year
MS.MEENAKSHI.P,AP/INT
UNIT II
• UNIT II TRANSITIONING TO IOE
• Convergence between organization’s operational technology (OT)
and information technology (IT) systems , M2M, M2P, and P2P
interactions, Business processes for evaluating a problem,
architectural structure to implement an IoE solution, Security
concerns.
GE (General Electric) coined the name “ Industrial Internet ” as their term
for the Industrial Internet of Things,
Cisco termed it the Internet of Everything and others called it Internet 4.0 or
other variants.
• The Industrial Internet provides a way to get better visibility and insight into
the company’s operations
• Integration of machine sensors, middleware, software, and backend cloud
compute and storage systems.
• Method of transforming business operational processes by using as
feedback the results gained from interrogating large data sets through
advanced analytics.
OT and IT
Increase Efficiency
Reduce Errors
Predictive Maintenance
Improved safety
Reduce Costs
CHALLENGES
• Different team perspectives
• Device communication challenges
• Scalability issues
• Cyber security challenges
• Faster evolution of IT
• Data Integration challenges
• Lack of standardization
• Lack of skills
• Successful IT/OT convergence requires:
✓ Development of joint standards and governance structures to align IT
and OT
✓ Combined management and execution of cross-technology projects
✓ Alignment of duplicate and overlapping processes
✓ Development of inter-disciplinary skills within both domains
✓ Combining the split responsibilities between IT & OT, especially
concerning security
✓ Single management and monitoring of the now separate infrastructures
Machine-to-Machine (M2M) Connections:
Information transferred from one machi-ne or “thing“ to another over a
network.
Machines include sensors, robots, compu-ters, and mobile devices. Often
called the Internet of Things (IoT).
Abstraction ⇒ Virtualization.
Orchestration: Should be able to control and manage thousands of devices with one
command.
Programmable: Should be able to change behaviour on the fly
Customers talk Companies talk Supply chain Machines on the Suppliers of raw
to companies to supply chain management factory floor talk materials inform
through management systems talk to to the suppliers supply chain
purchase habits channels. machines on the of raw materials. management
and online factory floor. channels of the
feedback. shipment of raw
materials.
• With IoE, there is the potential of providing connections all the way
back to the mines and drilling operations, where raw materials are
extracted from the ground.
• Those mines, which are the start of the production value chain,
illustrate the IoE’s value, particularly its ability to offer predictive
insights.
• There are many challenges and each system has its own
requirements which must be considered.
• The processes required for connecting different systems, how you
may adjust different technologies.
IMPLEMENTING IOE SOLUTION
• Business managers must also take into consideration business goals, business styles,
tolerance to risk, and the level of technical expertise available.
• Business managers must analyze the feasibility of an IoE project based on how it
contributes to business success. Considerations might include:
• Profitability − Determine cost and return on investment of implementing the IoE project as
a result of efficiencies and improvements.
• Business growth and market share − Identify growth opportunities and competitive
advantages due to the IoE implementation as a result of new insights.
• Customer satisfaction – Determine the impact to customer experience and loyalty as a
result of improved responsiveness to customer needs.
Determine technical requirements
• After business managers have determined their priorities and
established the changes in business processes that must be made,
the technology professionals can then begin the process of
determining the technical requirements.
Standardisation Equipment Network Security Network Programming Data processing
scalability management and access
What technology What new How does the What security Does the new What are the When is it
is required to equipment is existing measures need to device integration programming necessary to
allow these required? Are infrastructure be implemented create a more requirements forward data to
systems to sensors needed to need to be on IT systems, OT complex network needed to support the Cloud for
communicate to track information? modified to systems, and end environment? If non-IP-enabled processing, and
IT systems, or to What devices are support the new devices? so, what new and IP-enabled when does data
convert these needed to technical services and devices? need to be
systems to use IP? aggregate requirements and applications need processed closer
information and data load? to be installed to to the source, for
help with simplify the example, in the
information management of Fog?
management? these updated
systems?
Potential constraints
Analytics tools
• Security strategy
Adaptable and real-time security Secure and dynamic connections Protecting customer and brand trust
Prepare to handle security as you Ensure that the right level of Reduce the impact and cost of
grow by deploying adaptable and security is in place for all security breaches with a seamless
real-time security. As business connections all the time. Advanced security strategy. Security breaches
evolves, adjust security levels to security measures and protocols erode customer confidence and
minimize risk. help achieve regulatory and privacy brand integrity. The security
compliance. All valuable assets strategy must detect, confirm,
including intellectual property, data, mitigate, and remediate threats
employees, and buildings are across the entire organisation.
protected.
• Pervasive
• Within the IoE, security must be pervasive. The approach to security
must be:
– consistent, automated, and extend to secured boundaries across organisations
– dynamic, to better recognise security threats through real-time predictive
analytics
– intelligent, providing visibility across all connections, and elements of the
infrastructure
– scalable, to meet the needs of a growing organisation
– agile, able to react in real-time
– comprehensive, end-to-end solution.
• Security architecture
Access Control Context-aware policies Context-aware inspection Network and global
and enforcement intelligence
Access control provides policy-based Context-aware policies use a simplified Context-aware inspection and security Network and global intelligence uses the
access for any user or device seeking descriptive business language to define enforcement use network and global correlation of global data to ensure that
access to the distributed network. Users security policies based on the full context intelligence to make enforcement the network is aware of environments that
are authenticated and authorised. End of the situation: who is sending, what decisions across the network. Flexible have a reputation for malicious activity. It
devices are also analyzed to determine if information, when, where and how. These deployment options, such as integrated provides deep insights into network
they meet the security policy. Non- security policies closely align with business security services, standalone appliances, activity and threats for fast and accurate
authenticating devices, such as printers, policies and are simpler to administer or cloud-based security services bring protection, and policy enforcement.
video cameras, sensors, and controllers across an organisation. They help protections closer to the user.
are also automatically identified and businesses provide more effective security
inventoried. and meet compliance objectives with
greater operational efficiency and control.
• Security devices
• Application-centric security
• As organisations move to application-centric environments, the
traditional security solutions are no longer adequate.
• ACI Security Solutions can be managed as a pool of resources that
are attached to applications and transactions using a central
controller.
• This solution can automatically scale on demand providing seamless
policy-based security
• Reduces cost and complexity
Wireless Security
• Wireless security is often implemented at the access point, or the
point where the wireless connection enters into the network. Basic
wireless security includes:
– setting strong authentication protocols with strong passwords
– configuring administrative security
– enabling encryption
– changing all default settings
– keeping firmware up-to-date.
• Redundancy and high availability
– redundant servers
– redundant fibre connections
– redundant power supplies.
Security policy
Remote access Information privacy Computer security Physical security Password policy
policy policy policy policy
Defines who can Defines what Defines the way in Defines how Defines what
connect, how they methods are used to which users are physical assets are password will be
can connect, when protect information allowed to use secured. Some used to access
they can connect, depending on the computers. This assets may need to specific resources
and what devices level of sensitivity. policy might define be locked away at and the complexity
can be used to Generally, the more who can use certain night, kept in a of the password.
connect to a system sensitive the computers, what locked area at all Often, this policy
remotely. This information, the programs must be times, or specifically will control how
policy also defines greater the level of used to protect a designated not to often a password
the assets that are protection used to computer, or if a leave the property. must be changed.
accessible to a secure it. certain storage
remote user. media is allowed to
be used.
• Personal data and the IoE
Volunteered data Inferred data Oserved data