Cybersecurity for Industrial Control Systems
SCADA, DCS, PLC, HMI and SIS
Book Details:
Publisher: | Auerbach Publications |
Series: |
CRC Press
|
Author: | Tyson Macaulay |
Edition: | 1 |
ISBN-10: | 1439801967 |
ISBN-13: | 9781439801963 |
Pages: | 203 |
Published: | Dec 13 2011 |
Posted: | Mar 03 2015 |
Language: | English |
Book format: | PDF |
Book size: | 4.98 MB |
Book Description:
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.
From the Viewpoint of Close-Loop
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewp...
Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. Divided into 11 chapters, the book explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also discusses industrial networks as they relate to "critical infrastruc...
Information Management, Condition Monitoring and Control of Power Systems
This book details the use of the Internet protocol suite and multi-agent systems for the information management, online monitoring, and control of distributed power system substations. It proposes an open architecture for information management and control, based on the concepts of multi-agent systems and mobile agents. Mobile agents are applied to the retrieval and analysis of substation data and to remote operator intervention....
2007 - 2021 © eBooks-IT.org