Industrial Internet of Things (IIoT) in Cyber Security in Japan, 2020

Industrial Internet of Things (IIoT) in Cyber Security in Japan, 2020

Growing Need for Cyber Security Among Industrial Firms in an IoT Environment

RELEASE DATE
08-Jul-2020
REGION
Asia Pacific
Research Code: 9AC3-00-10-00-00
SKU: IT04147-AP-MR_24578

$1,500.00

Special Price $1,275.00 save 15 %

In stock
SKU
IT04147-AP-MR_24578

$1,500.00

$1,275.00 save 15 %

DownloadLink

Pay by invoice

ENQUIRE NOW

Description

Of late, cyber space has been driving socio-economic activities, as a fall-out of the unification of cyber space and real space including entire industries, especially manufacturing industries, which is termed Industrial Internet of Things (IIoT).

The vast amount of data produced by sensors and devices every second from all over the world is being stored and analyzed in cyber space globally. In addition, real-time delivery of new products and services that use data to provide added value is evolving in a number of domains. In such circumstances, cyber space and real space can no longer be considered separately.

Modern operations spread across complex information technology (IT) and operational technology (OT) infrastructures. These include several devices connected via IIoT. This leads to new challenges in protecting the industrial environment. To protect this complex attack surface, many industrial organizations are trying to integrate IT and OT operations.

In a race for more efficient operation, industrial control systems (ICS) running on legacy hardware are integrated with software and smart devices. As the chances of servers, controllers, surveillance equipment, and sensors connecting to the Internet increase, the scope for cyber attacks expands.

A new cyber security solution framework is required for this kind of combined new space and the coming digital age, due to this massive expansion of data from major socio-economic activities, the including IIoT ecosystem. The amount of data generated from IIoT has increased enormously, and the importance of data and the need for security measures have become urgent issues.

From this combined new space expansion, the risk of economic and social loss or damage in the real space is expected to accelerate very much from the opportunity for malicious activities in cyber space. As a result, it is necessary to secure the IIoT environment, which has grown to be the basis of today's economic society, and to achieve sustainable secured development. It is also necessary to secure autonomous evolution and development, and tackle security issues. It requires a cross-cutting and agile approach.

This study is describes the IIoT ecosystem in 6 layers: devices, LAN, servers, outside network, cloud, and edge/ and gateway. The characteristics of the Japanese market are examined from the aspects of political, technological, economic, legal, and socio-cultural points of view.

The content proposes growth opportunities in the expanding combined real and cyber space from IIoT and cyber security point of view in Japan.

Table of Contents

Executive Summary

What is IIoT?

What is IIoT? (continued)

Cloudification Between IT and OT

Increased Convergence Between IT and OT

Types of Cyber Attacks

Key Challenges in Cyber Security

IIoT in Enterprise

6 Layers of IIoT—Security for IIoT Devices

6 Layers of IIoT—Security for LAN

6 Layers of IIoT—Security for Servers

6 Layers of IIoT—Security for Outside Network

6 Layers of IIoT—Security for Cloud

6 Layers of IIoT—Security for the Edge/Gateway

IIoT Development in Japan

Deploying IIoT Applications Across Industries and the Emerging Security Issues

Factors Influencing Japanese Cyber Security

Gap Between Management and Operation Levels

Lack of Awareness Among Operators

Attack Case 1

Attack Case 3

Yokogawa Electric

Power Plants

Hitachi

Growth Opportunity 1—Mission Assurance

Growth Opportunity 2—Appropriate Risk Management and Response to Cyber Threats

Growth Opportunity 3—‘New Cyber Hygiene’

Strategic Imperatives for Success and Growth

Conclusions

Legal Disclaimer

The Frost & Sullivan Story

Value Proposition—Future of Your Company & Career

Global Perspective

Industry Convergence

360º Research Perspective

Implementation Excellence

Our Blue Ocean Strategy

Related Research
Of late, cyber space has been driving socio-economic activities, as a fall-out of the unification of cyber space and real space including entire industries, especially manufacturing industries, which is termed Industrial Internet of Things (IIoT). The vast amount of data produced by sensors and devices every second from all over the world is being stored and analyzed in cyber space globally. In addition, real-time delivery of new products and services that use data to provide added value is evolving in a number of domains. In such circumstances, cyber space and real space can no longer be considered separately. Modern operations spread across complex information technology (IT) and operational technology (OT) infrastructures. These include several devices connected via IIoT. This leads to new challenges in protecting the industrial environment. To protect this complex attack surface, many industrial organizations are trying to integrate IT and OT operations. In a race for more efficient operation, industrial control systems (ICS) running on legacy hardware are integrated with software and smart devices. As the chances of servers, controllers, surveillance equipment, and sensors connecting to the Internet increase, the scope for cyber attacks expands. A new cyber security solution framework is required for this kind of combined new space and the coming digital age, due to this massive expansion of data from major socio-economic activities, the including IIoT ecosystem. The amount of data generated from IIoT has increased enormously, and the importance of data and the need for security measures have become urgent issues. From this combined new space expansion, the risk of economic and social loss or damage in the real space is expected to accelerate very much from the opportunity for malicious activities in cyber space. As a result, it is necessary to secure the IIoT environment, which has grown to be the basis of today's economic society, and to achieve sustainable secured development. It is also necessary to secure autonomous evolution and development, and tackle security issues. It requires a cross-cutting and agile approach. This study is describes the IIoT ecosystem in 6 layers: devices, LAN, servers, outside network, cloud, and edge/ and gateway. The characteristics of the Japanese market are examined from the aspects of political, technological, economic, legal, and socio-cultural points of view. The content proposes growth opportunities in the expanding combined real and cyber space from IIoT and cyber security point of view in Japan.
More Information
No Index No
Podcast No
Author Toshio Ogane
Industries Information Technology
WIP Number 9AC3-00-10-00-00
Is Prebook No
GPS Codes 9532-C1,9659,9856-74