Book description
As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are required.
Table of contents
- Front Cover
- Contents
- Authors
- Chapter 1: Introduction (1/9)
- Chapter 1: Introduction (2/9)
- Chapter 1: Introduction (3/9)
- Chapter 1: Introduction (4/9)
- Chapter 1: Introduction (5/9)
- Chapter 1: Introduction (6/9)
- Chapter 1: Introduction (7/9)
- Chapter 1: Introduction (8/9)
- Chapter 1: Introduction (9/9)
- Chapter 2: Threats to ICS (1/8)
- Chapter 2: Threats to ICS (2/8)
- Chapter 2: Threats to ICS (3/8)
- Chapter 2: Threats to ICS (4/8)
- Chapter 2: Threats to ICS (5/8)
- Chapter 2: Threats to ICS (6/8)
- Chapter 2: Threats to ICS (7/8)
- Chapter 2: Threats to ICS (8/8)
- Chapter 3: ICS Vulnerabilities (1/9)
- Chapter 3: ICS Vulnerabilities (2/9)
- Chapter 3: ICS Vulnerabilities (3/9)
- Chapter 3: ICS Vulnerabilities (4/9)
- Chapter 3: ICS Vulnerabilities (5/9)
- Chapter 3: ICS Vulnerabilities (6/9)
- Chapter 3: ICS Vulnerabilities (7/9)
- Chapter 3: ICS Vulnerabilities (8/9)
- Chapter 3: ICS Vulnerabilities (9/9)
- Chapter 4: Risk Assessment Techniques (1/8)
- Chapter 4: Risk Assessment Techniques (2/8)
- Chapter 4: Risk Assessment Techniques (3/8)
- Chapter 4: Risk Assessment Techniques (4/8)
- Chapter 4: Risk Assessment Techniques (5/8)
- Chapter 4: Risk Assessment Techniques (6/8)
- Chapter 4: Risk Assessment Techniques (7/8)
- Chapter 4: Risk Assessment Techniques (8/8)
- Chapter 5: What Is Next in ICS Security? (1/5)
- Chapter 5: What Is Next in ICS Security? (2/5)
- Chapter 5: What Is Next in ICS Security? (3/5)
- Chapter 5: What Is Next in ICS Security? (4/5)
- Chapter 5: What Is Next in ICS Security? (5/5)
- Back Cover
Product information
- Title: Cybersecurity for Industrial Control Systems
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439801987
You might also like
book
Industrial Network Security
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems …
book
Cybersecurity of Industrial Systems
How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, …
book
Industrial Network Security, 2nd Edition
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, …
book
Pentesting Industrial Control Systems
Discover modern tactics, techniques, and procedures for pentesting industrial control systems Key Features Become well-versed with …