Industrial Internet of Things (IIoT) in Cyber Security in Japan, 2020
Industrial Internet of Things (IIoT) in Cyber Security in Japan, 2020
Growing Need for Cyber Security Among Industrial Firms in an IoT Environment
08-Jul-2020
Asia Pacific
Market Research
Description
Of late, cyber space has been driving socio-economic activities, as a fall-out of the unification of cyber space and real space including entire industries, especially manufacturing industries, which is termed Industrial Internet of Things (IIoT).
The vast amount of data produced by sensors and devices every second from all over the world is being stored and analyzed in cyber space globally. In addition, real-time delivery of new products and services that use data to provide added value is evolving in a number of domains. In such circumstances, cyber space and real space can no longer be considered separately.
Modern operations spread across complex information technology (IT) and operational technology (OT) infrastructures. These include several devices connected via IIoT. This leads to new challenges in protecting the industrial environment. To protect this complex attack surface, many industrial organizations are trying to integrate IT and OT operations.
In a race for more efficient operation, industrial control systems (ICS) running on legacy hardware are integrated with software and smart devices. As the chances of servers, controllers, surveillance equipment, and sensors connecting to the Internet increase, the scope for cyber attacks expands.
A new cyber security solution framework is required for this kind of combined new space and the coming digital age, due to this massive expansion of data from major socio-economic activities, the including IIoT ecosystem. The amount of data generated from IIoT has increased enormously, and the importance of data and the need for security measures have become urgent issues.
From this combined new space expansion, the risk of economic and social loss or damage in the real space is expected to accelerate very much from the opportunity for malicious activities in cyber space. As a result, it is necessary to secure the IIoT environment, which has grown to be the basis of today's economic society, and to achieve sustainable secured development. It is also necessary to secure autonomous evolution and development, and tackle security issues. It requires a cross-cutting and agile approach.
This study is describes the IIoT ecosystem in 6 layers: devices, LAN, servers, outside network, cloud, and edge/ and gateway. The characteristics of the Japanese market are examined from the aspects of political, technological, economic, legal, and socio-cultural points of view.
The content proposes growth opportunities in the expanding combined real and cyber space from IIoT and cyber security point of view in Japan.
Table of Contents
Executive Summary
What is IIoT?
What is IIoT? (continued)
Cloudification Between IT and OT
Increased Convergence Between IT and OT
Types of Cyber Attacks
Key Challenges in Cyber Security
IIoT in Enterprise
6 Layers of IIoT—Security for IIoT Devices
6 Layers of IIoT—Security for LAN
6 Layers of IIoT—Security for Servers
6 Layers of IIoT—Security for Outside Network
6 Layers of IIoT—Security for Cloud
6 Layers of IIoT—Security for the Edge/Gateway
IIoT Development in Japan
Deploying IIoT Applications Across Industries and the Emerging Security Issues
Factors Influencing Japanese Cyber Security
Gap Between Management and Operation Levels
Lack of Awareness Among Operators
Attack Case 1
Attack Case 3
Yokogawa Electric
Power Plants
Hitachi
Growth Opportunity 1—Mission Assurance
Growth Opportunity 2—Appropriate Risk Management and Response to Cyber Threats
Growth Opportunity 3—‘New Cyber Hygiene’
Strategic Imperatives for Success and Growth
Conclusions
Legal Disclaimer
The Frost & Sullivan Story
Value Proposition—Future of Your Company & Career
Global Perspective
Industry Convergence
360º Research Perspective
Implementation Excellence
Our Blue Ocean Strategy
Growth dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Popular Topics
Deliverable Type | Market Research |
---|---|
No Index | No |
Podcast | No |
Author | Toshio Ogane |
Industries | Information Technology |
WIP Number | 9AC3-00-10-00-00 |
Is Prebook | No |
GPS Codes | 9532-C1,9659,9856-74 |