Book description
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and im
Table of contents
- Front Cover
- Contents
- Authors
- Chapter 1: Introduction (1/9)
- Chapter 1: Introduction (2/9)
- Chapter 1: Introduction (3/9)
- Chapter 1: Introduction (4/9)
- Chapter 1: Introduction (5/9)
- Chapter 1: Introduction (6/9)
- Chapter 1: Introduction (7/9)
- Chapter 1: Introduction (8/9)
- Chapter 1: Introduction (9/9)
- Chapter 2: Threats to ICS (1/8)
- Chapter 2: Threats to ICS (2/8)
- Chapter 2: Threats to ICS (3/8)
- Chapter 2: Threats to ICS (4/8)
- Chapter 2: Threats to ICS (5/8)
- Chapter 2: Threats to ICS (6/8)
- Chapter 2: Threats to ICS (7/8)
- Chapter 2: Threats to ICS (8/8)
- Chapter 3: ICS Vulnerabilities (1/9)
- Chapter 3: ICS Vulnerabilities (2/9)
- Chapter 3: ICS Vulnerabilities (3/9)
- Chapter 3: ICS Vulnerabilities (4/9)
- Chapter 3: ICS Vulnerabilities (5/9)
- Chapter 3: ICS Vulnerabilities (6/9)
- Chapter 3: ICS Vulnerabilities (7/9)
- Chapter 3: ICS Vulnerabilities (8/9)
- Chapter 3: ICS Vulnerabilities (9/9)
- Chapter 4: Risk Assessment Techniques (1/8)
- Chapter 4: Risk Assessment Techniques (2/8)
- Chapter 4: Risk Assessment Techniques (3/8)
- Chapter 4: Risk Assessment Techniques (4/8)
- Chapter 4: Risk Assessment Techniques (5/8)
- Chapter 4: Risk Assessment Techniques (6/8)
- Chapter 4: Risk Assessment Techniques (7/8)
- Chapter 4: Risk Assessment Techniques (8/8)
- Chapter 5: What Is Next in ICS Security? (1/5)
- Chapter 5: What Is Next in ICS Security? (2/5)
- Chapter 5: What Is Next in ICS Security? (3/5)
- Chapter 5: What Is Next in ICS Security? (4/5)
- Chapter 5: What Is Next in ICS Security? (5/5)
- Back Cover
Product information
- Title: Cybersecurity for Industrial Control Systems
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439801987
You might also like
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …
book
Container Security
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers …
book
Internal Control Audit and Compliance: Documentation and Testing Under the New COSO Framework
Ease the transition to the new COSO framework with practical strategy Internal Control Audit and Compliance …