Muutke küpsiste eelistusi

Cybersecurity for SCADA Systems Second Edition [Kõva köide]

  • Formaat: Hardback, 499 pages, kõrgus x laius: 229x152 mm, kaal: 933 g
  • Ilmumisaeg: 30-Jan-2021
  • Kirjastus: PennWell Books
  • ISBN-10: 1593705069
  • ISBN-13: 9781593705060
  • Formaat: Hardback, 499 pages, kõrgus x laius: 229x152 mm, kaal: 933 g
  • Ilmumisaeg: 30-Jan-2021
  • Kirjastus: PennWell Books
  • ISBN-10: 1593705069
  • ISBN-13: 9781593705060

The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition also takes advantage of the evolved industry-specific cybersecurity standards that have emerged, especially in the electric power and oil-and-gas pipeline industry sectors.

Cybersecurity for SCADA Systems, 2nd Edition is intended to provide a general background of SCADA system technology and cybersecurity concepts and technologies, showing how the two can be brought together to safeguard our infrastructure and computer automation systems. This book provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues and learn strategies for decreasing or eliminating system vulnerabilities. Cybersecurity for SCADA Systems, 2nd Edition is suitable for nontechnical, management-level personnel as well as IT personnel without SCADA experience.

Features and Benefits

  • Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system
  • IT and cybersecurity technology and terminology overview and explanation
  • Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies
  • Discussion of physical and electronic security issues and strategies

Audience

  • IT personnel
  • Management
  • Students
  • Chapter 1
    • The technological evolution of SCADA systems
    • The Early History of SCADA-Mainframes
    • Minicomputers and Microprocessors
    • Central Architectures
    • Distributed Architectures
    • Client/Server Designs
    • Technological Convergence
    • Ubiquitous Internet and IP Networking
    • Generalized Software Architecture
  • Chapter 2
    • Remote terminal units
    • Basic Features and Functions
    • Smart RTU Technology
    • Top-Down and Bottom-Up Configuration
    • The Emergence of PLCs
    • Legacy Protocols
    • Protocol Standards
    • IP-Ready RTUs and Protocols
  • Chapter 3
    • Telecommunications technologies
    • Voice-Grade (Analog) Telephony
    • Commercial Voice/Data Carriers
    • Options for Wireless Communications
    • Digital Networking Technologies
    • TCP/IP Networking
    • The Internet
  • Chapter 4
    • Supervisory control applications
    • Operating System Utilities
    • SCADA System Utilities
    • Program Development Tools
    • Standardized APIs
  • Chapter 5
    • Operator interface
    • Access-Control Mechanisms
    • Standard System Displays
    • Site/Industry-Specific Displays
    • Historical Trending
    • Logs and Reports
  • Chapter 6
    • Conventional information technology
    • Availability, Integrity, and Confidentiality
    • Remote Access/Connectivity
    • TCP/IP Suite
    • Firewalls & Routers
    • Wireless LANs
    • Authentication and Validation
    • Encryption and Ciphers
  • Chapter 7
    • Identifying cybersecurity vulnerabilities
    • Threats and Threat Agents
    • Obvious Points of Attack and Vulnerability
  • Chapter 8
    • Malware, cyberattacks and hacking tools
    • Vulnerabilities
    • WEB Server/SQL Injection
    • Email and Web browsing
    • Malware
  • Chapter 9
    • Physical security
    • Access Controls
    • Access tracking
    • Illegal-entry Alarms
    • Physical Isolation of Assets: Layers of Defense
    • Physical Protection of Materials and Information
    • Critical Ancillary Subsystems
    • Remote and Field Sites
  • Chapter 10
    • Operational security
    • Policies and Administrative Controls
    • Procedures
    • Operational Differences
    • Training
    • Recovery Procedures
    • Annual Review
    • Background Checks
  • Chapter 11
    • Computer systems & Network security
  • Chapter 12
    • Electric utility industry-specific cybersecurity issues
    • Substation Backdoors
    • IP to the Substation
    • TASE
    • UCA2 (IEC61850)
    • DNP3
    • NERC 1200/1300 Compliance
  • Chapter 13
    • Water/Wastewater industry-specific cybersecurity issues
    • Licensed Radio Communications
    • Nonsecure Protocols
    • PLC Equipment as RTUs
    • Supervisory and Local Control Applications
    • Municipal LANs and WANs
    • Control Interfaces to Plant Control Systems
  • Chapter 14
    • Pipeline industry-specific cybersecurity issues
    • Radio Communications
    • Smart RTUs
    • RTU Program Logic
    • Supervisory Control Applications
    • IP along the Pipeline
    • Web Browsing and Email Integration
  • Chapter 15
    • The cyberthreat to SCADA systems
  • Chapter 16
    • Commercial product vulnerabilities
Dr. William (Tim) Shaw - CISSP, C|EH, CPT, CAP. Over 40 years of industry experience designing and deploying DCS, SCADA and PLC based industrial control and automation systems in a range of industries including Electric power, Oil and Gas pipelines, Refining, Water and Waste-Water, Petrochemical, Steel, Glass, Pharmaceuticals, Wind Turbines and Substation Automation.