Cybersecurity for Industrial Control Systems

SCADA, DCS, PLC, HMI, and SIS

Author: Tyson Macaulay,Bryan L. Singer

Publisher: CRC Press

ISBN: 1466516119

Category: Business & Economics

Page: 203

View: 2890

DOWNLOAD NOW »

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS. Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required. The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.
Release

Applied Cyber Security and the Smart Grid

Implementing Security Controls into the Modern Power Infrastructure

Author: Eric D. Knapp,Raj Samani

Publisher: Newnes

ISBN: 012404638X

Category: Computers

Page: 224

View: 1247

DOWNLOAD NOW »

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer. Discover the potential of the Smart Grid Learn in depth about its systems See its vulnerabilities and how best to protect it
Release

Service Orientation in Holonic and Multi-Agent Manufacturing

Proceedings of SOHOMA 2018

Author: Theodor Borangiu,Damien Trentesaux,André Thomas,Sergio Cavalieri

Publisher: Springer

ISBN: 3030030032

Category: Computers

Page: 462

View: 1767

DOWNLOAD NOW »

This book gathers the peer-reviewed papers presented at the 8th edition of the International Workshop “Service Orientation in Holonic and Multi-Agent Manufacturing – SOHOMA’18” held at the University of Bergamo, Italy on June 11–12, 2018. The objective of the SOHOMA annual workshops is to foster innovation in smart and sustainable manufacturing and logistics systems by promoting new concepts, methods and solutions that use service orientation of agent-based control technologies with distributed intelligence. Reflecting the theme of SOHOMA’18: “Digital transformation of manufacturing with agent-based control and service orientation of Internet-scale platforms”, the research included focuses on how the digital transformation, as advocated by the “Industry 4.0”, “Industrial Internet of Things”, “Cyber-Physical Production Systems” and “Cloud Manufacturing” frameworks, improves the efficiency, agility and sustainability of manufacturing processes, products, and services, and how it relates to the interaction between the physical and informational worlds, which is implemented in the virtualization of products, processes and resources managed as services.
Release

Securing Cloud and Mobility

A Practitioner's Guide

Author: Ian Lim,E. Coleen Coolidge,Paul Hourani

Publisher: CRC Press

ISBN: 1482209349

Category: Business & Economics

Page: 228

View: 7602

DOWNLOAD NOW »

Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive coverage that inc
Release

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions

Author: Clint Bodungen,Bryan Singer,Aaron Shbeeb,Kyle Wilhoit,Stephen Hilt

Publisher: McGraw Hill Professional

ISBN: 1259589722

Category: Computers

Page: 544

View: 769

DOWNLOAD NOW »

Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the battle-tested Hacking Exposed style, the book arms you with the skills and tools necessary to defend against attacks that are debilitating—and potentially deadly. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions explains vulnerabilities and attack vectors specific to ICS/SCADA protocols, applications, hardware, servers, and workstations. You will learn how hackers and malware, such as the infamous Stuxnet worm, can exploit them and disrupt critical processes, compromise safety, and bring production to a halt. The authors fully explain defense strategies and offer ready-to-deploy countermeasures. Each chapter features a real-world case study as well as notes, tips, and cautions. Features examples, code samples, and screenshots of ICS/SCADA-specific attacks Offers step-by-step vulnerability assessment and penetration test instruction Written by a team of ICS/SCADA security experts and edited by Hacking Exposed veteran Joel Scambray
Release