Authors |
|
ix | |
|
|
1 | (44) |
|
Where This Book Starts and Stops |
|
|
2 | (1) |
|
|
3 | (3) |
|
What Is an Industrial Control System? |
|
|
6 | (2) |
|
Is Industrial Control System Security Different Than Regular IT Security? |
|
|
8 | (1) |
|
|
9 | (5) |
|
ICS Compared to Safety Instrumented Systems |
|
|
14 | (1) |
|
What Has Changed in ICS That Raises New Concerns? |
|
|
15 | (3) |
|
Naming, Functionality, and Components of Typical ICS/SCADA Systems |
|
|
18 | (4) |
|
Supervisory Control and Data Acquisition (SCADA) |
|
|
19 | (1) |
|
Remote Terminal Unit (RTU) |
|
|
20 | (1) |
|
Distributed Control System (DCS) |
|
|
20 | (1) |
|
Programmable Logic Controllers (PLCs) |
|
|
20 | (1) |
|
Human-Machine Interface (HMI) |
|
|
21 | (1) |
|
Analogue versus IP Industrial Automation |
|
|
22 | (3) |
|
Convergence 101: It Is Not Just Process Data Crowding onto IP |
|
|
25 | (2) |
|
Convergence by Another Name |
|
|
27 | (1) |
|
|
28 | (5) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (2) |
|
The Business Drivers of IP Convergence |
|
|
33 | (1) |
|
|
33 | (3) |
|
|
36 | (1) |
|
|
37 | (1) |
|
The Conflicting Priorities of Convergence |
|
|
38 | (2) |
|
ICS Security Architecture and Convergence |
|
|
40 | (3) |
|
The Discussions to Follow in This Book |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (36) |
|
Threats to ICS: How Security Requirements Are Different from ICS to IT |
|
|
46 | (8) |
|
Threat Treatment in ICS and IT |
|
|
53 | (1) |
|
|
54 | (3) |
|
Threat-To and Threat-From |
|
|
57 | (2) |
|
The Most Serious Threat to ICS |
|
|
59 | (5) |
|
|
60 | (1) |
|
Whatever Happened to the Old-Fashioned E-Mail Virus? |
|
|
60 | (2) |
|
|
62 | (1) |
|
The Fatally Curious, Naive, and Gullible |
|
|
62 | (2) |
|
|
64 | (4) |
|
|
68 | (1) |
|
Taxonomy of Hi-Jacking Malware and Botnets |
|
|
68 | (4) |
|
|
69 | (1) |
|
Characteristics of a Bot (Zombie/Drone) |
|
|
69 | (3) |
|
The Reproductive Cycle of Modern Malware |
|
|
72 | (4) |
|
A Socks 4/Sock 5/HTTP Connect Proxy |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (1) |
|
Conclusions on ICS Threats |
|
|
79 | (1) |
|
|
80 | (1) |
|
Chapter 3 ICS Vulnerabilities |
|
|
81 | (44) |
|
ICS Vulnerability versus IT Vulnerabilities |
|
|
82 | (1) |
|
Availability, Integrity, and Confidentiality |
|
|
83 | (6) |
|
Purdue Enterprise Reference Architecture |
|
|
89 | (4) |
|
|
89 | (1) |
|
Levels 5 and 4 Enterprise Systems |
|
|
89 | (1) |
|
Level 3 Operations Management |
|
|
90 | (1) |
|
Level 2 Supervisory Control |
|
|
90 | (1) |
|
Level 1 Local or Basic Control |
|
|
91 | (1) |
|
|
91 | (1) |
|
An Ironic Comment on PERA |
|
|
92 | (1) |
|
Data at Rest, Data in Use, Data in Motion |
|
|
93 | (2) |
|
Distinguishing Business, Operational, and Technical Features of ICS |
|
|
95 | (3) |
|
|
98 | (8) |
|
Management Vulnerabilities |
|
|
99 | (1) |
|
Operational Vulnerabilities |
|
|
100 | (5) |
|
Technical Vulnerabilities |
|
|
105 | (1) |
|
Functional Vulnerabilities |
|
|
106 | (5) |
|
ICS Technical Vulnerability Class Breakdown |
|
|
111 | (3) |
|
Technical Vectors of Attack |
|
|
113 | (1) |
|
IT Devices on the ICS Network |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (2) |
|
Limited Processing Power and Memory Size |
|
|
118 | (1) |
|
Storms/DOS of Various Forms |
|
|
119 | (1) |
|
|
120 | (1) |
|
MITM and Packet Injection |
|
|
121 | (2) |
|
|
123 | (1) |
|
|
123 | (2) |
|
Chapter 4 Risk Assessment Techniques |
|
|
125 | (38) |
|
|
125 | (1) |
|
Contemporary ICS Security Analysis Techniques |
|
|
126 | (4) |
|
North American Electricity Reliability Council (NERC) |
|
|
126 | (2) |
|
National Institute of Standards and Technology (NIST) |
|
|
128 | (1) |
|
Department of Homeland Security (DHS) ICS Risk Assessment Processes |
|
|
129 | (1) |
|
INL National SCADA Test Bed Program (NSTB): Control System Security Assessment |
|
|
130 | (1) |
|
INL Vulnerability Assessment Methodology |
|
|
131 | (2) |
|
INL Metrics-Based Reporting for Risk Assessment |
|
|
133 | (1) |
|
Ideal-Based Risk Assessment and Metrics |
|
|
134 | (1) |
|
CCSP Cyber Security Evaluation Tool (CSET) |
|
|
135 | (2) |
|
U.S. Department of Energy: Electricity Sector Cyber Security Risk Management Process Guideline |
|
|
136 | (1) |
|
Evolving Risk Assessment Processes |
|
|
137 | (4) |
|
|
138 | (2) |
|
Safety Integrity Levels and Security Assurance Levels |
|
|
140 | (1) |
|
|
141 | (3) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (2) |
|
Overall Equipment Effectiveness (Assessment) |
|
|
148 | (1) |
|
|
149 | (3) |
|
Putting OEE Metrics Together |
|
|
152 | (3) |
|
Network-Centric Assessment |
|
|
153 | (2) |
|
Network-Centric Compromise Indicators |
|
|
155 | (2) |
|
Assessing Threat Agents, Force, and Velocity |
|
|
155 | (2) |
|
Other Network Infrastructure That Can Be Used for Network-Centric Analysis and ICS Security |
|
|
157 | (2) |
|
Network-Centric Assessment Caveats |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (2) |
|
Chapter 5 What Is Next in ICS Security? |
|
|
163 | (24) |
|
|
163 | (1) |
|
|
164 | (4) |
|
There Is a New Internet Protocol in Town |
|
|
164 | (1) |
|
|
164 | (1) |
|
What Does IPv6 Mean for My Business in General? |
|
|
165 | (1) |
|
What Does the Switch to IPv6 Mean for the Security of My ICS Network? |
|
|
166 | (1) |
|
What Will the Move to IPv6 Require, for IT and ICS? |
|
|
167 | (1) |
|
|
168 | (14) |
|
Stage 1 Test Environment: Introduce IPv6 |
|
|
169 | (1) |
|
Stage 2 Test Environment: Sense IPv6 |
|
|
170 | (1) |
|
Stage 3 Test Environment: Dual-Stack Testing |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (2) |
|
|
174 | (2) |
|
ICS and Cellular Wireless |
|
|
176 | (1) |
|
Private Architecture and Cellular Wireless |
|
|
176 | (4) |
|
v6 Security Testing Methodology for ICS Devices |
|
|
180 | (2) |
|
|
182 | (3) |
|
Pros and Cons of IPv6 and Low-Power (Wireless) Devices |
|
|
183 | (2) |
|
|
185 | (1) |
|
|
185 | (2) |
Index |
|
187 | |