Currently, the widespread implementation of Industry 4.0 concepts has led to the emergence of complex Cyber-Physical Production Systems (CPPS), which are based on the paradigm of "digital production" [1]. Digital production is a mirror image of physical processes in virtual space. For this to exist, it is necessary to develop one information eco-system that combines: sensors, Programmable Logic Controller (PLC), Supervisory Control And Data Acquisition (SCADA) / human-machine interface (HMI) and allows you to implement a single Manufacturing Execution System (MES). Industrial Internet of Things (IIoT) is a network that allows you to unite all industrial facilities in order to solve problems: increasing equipment productivity, reducing material and energy costs, improving quality, optimizing technological processes [2]. As a result, multiple flows of information appear for many different operations, from signal processing to optimization, visualization, cognitive and highperformance computing. To deal with a huge amount of data, industrial clouds are used, they are located in an area remote from the main production. Thus, it inevitably continues to expand and use the growing computing power available to operators via smartphones and laptops [3]. Cybersecurity -protection against unauthorized access and theft of business information and valuable knowledge in digital form. Before finding a solution for cybersecurity breaches, it is necessary to synthesize existing knowledge about possible cybersecurity threats targeting different levels of IIoT, as well as the consequences and countermeasures. Ramjee Prasad, Vandana Rohokale analyzed methods of cyber-attacks on Machine to Machine (M2M) [4].Based on this, we can select a Network Layer through which an attack can be carried out using the following methods, which are shown in the figure 1.M. Lezzi, M. Lazoi conducted an analysis of publications and research in the areas of cybersecurity for Industry 4.0 [5]. In which the possibility of carrying out cyberattacks at the SCADA / HMI, MES level through the Internet of Things (IoT) was highlighted. Considering the complex publications, one can distinguish Application Layer (fig. 2) and attack methods [6][7][8][9][10].