Cybersecurity for Industrial Control Systems

Book description

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and im

Table of contents

  1. Front Cover
  2. Contents
  3. Authors
  4. Chapter 1: Introduction (1/9)
  5. Chapter 1: Introduction (2/9)
  6. Chapter 1: Introduction (3/9)
  7. Chapter 1: Introduction (4/9)
  8. Chapter 1: Introduction (5/9)
  9. Chapter 1: Introduction (6/9)
  10. Chapter 1: Introduction (7/9)
  11. Chapter 1: Introduction (8/9)
  12. Chapter 1: Introduction (9/9)
  13. Chapter 2: Threats to ICS (1/8)
  14. Chapter 2: Threats to ICS (2/8)
  15. Chapter 2: Threats to ICS (3/8)
  16. Chapter 2: Threats to ICS (4/8)
  17. Chapter 2: Threats to ICS (5/8)
  18. Chapter 2: Threats to ICS (6/8)
  19. Chapter 2: Threats to ICS (7/8)
  20. Chapter 2: Threats to ICS (8/8)
  21. Chapter 3: ICS Vulnerabilities (1/9)
  22. Chapter 3: ICS Vulnerabilities (2/9)
  23. Chapter 3: ICS Vulnerabilities (3/9)
  24. Chapter 3: ICS Vulnerabilities (4/9)
  25. Chapter 3: ICS Vulnerabilities (5/9)
  26. Chapter 3: ICS Vulnerabilities (6/9)
  27. Chapter 3: ICS Vulnerabilities (7/9)
  28. Chapter 3: ICS Vulnerabilities (8/9)
  29. Chapter 3: ICS Vulnerabilities (9/9)
  30. Chapter 4: Risk Assessment Techniques (1/8)
  31. Chapter 4: Risk Assessment Techniques (2/8)
  32. Chapter 4: Risk Assessment Techniques (3/8)
  33. Chapter 4: Risk Assessment Techniques (4/8)
  34. Chapter 4: Risk Assessment Techniques (5/8)
  35. Chapter 4: Risk Assessment Techniques (6/8)
  36. Chapter 4: Risk Assessment Techniques (7/8)
  37. Chapter 4: Risk Assessment Techniques (8/8)
  38. Chapter 5: What Is Next in ICS Security? (1/5)
  39. Chapter 5: What Is Next in ICS Security? (2/5)
  40. Chapter 5: What Is Next in ICS Security? (3/5)
  41. Chapter 5: What Is Next in ICS Security? (4/5)
  42. Chapter 5: What Is Next in ICS Security? (5/5)
  43. Back Cover

Product information

  • Title: Cybersecurity for Industrial Control Systems
  • Author(s): Tyson Macaulay, Bryan L. Singer
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439801987