Cybersecurity for Industrial Control Systems

Book description

As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are required.

Table of contents

  1. Front Cover
  2. Contents
  3. Authors
  4. Chapter 1: Introduction (1/9)
  5. Chapter 1: Introduction (2/9)
  6. Chapter 1: Introduction (3/9)
  7. Chapter 1: Introduction (4/9)
  8. Chapter 1: Introduction (5/9)
  9. Chapter 1: Introduction (6/9)
  10. Chapter 1: Introduction (7/9)
  11. Chapter 1: Introduction (8/9)
  12. Chapter 1: Introduction (9/9)
  13. Chapter 2: Threats to ICS (1/8)
  14. Chapter 2: Threats to ICS (2/8)
  15. Chapter 2: Threats to ICS (3/8)
  16. Chapter 2: Threats to ICS (4/8)
  17. Chapter 2: Threats to ICS (5/8)
  18. Chapter 2: Threats to ICS (6/8)
  19. Chapter 2: Threats to ICS (7/8)
  20. Chapter 2: Threats to ICS (8/8)
  21. Chapter 3: ICS Vulnerabilities (1/9)
  22. Chapter 3: ICS Vulnerabilities (2/9)
  23. Chapter 3: ICS Vulnerabilities (3/9)
  24. Chapter 3: ICS Vulnerabilities (4/9)
  25. Chapter 3: ICS Vulnerabilities (5/9)
  26. Chapter 3: ICS Vulnerabilities (6/9)
  27. Chapter 3: ICS Vulnerabilities (7/9)
  28. Chapter 3: ICS Vulnerabilities (8/9)
  29. Chapter 3: ICS Vulnerabilities (9/9)
  30. Chapter 4: Risk Assessment Techniques (1/8)
  31. Chapter 4: Risk Assessment Techniques (2/8)
  32. Chapter 4: Risk Assessment Techniques (3/8)
  33. Chapter 4: Risk Assessment Techniques (4/8)
  34. Chapter 4: Risk Assessment Techniques (5/8)
  35. Chapter 4: Risk Assessment Techniques (6/8)
  36. Chapter 4: Risk Assessment Techniques (7/8)
  37. Chapter 4: Risk Assessment Techniques (8/8)
  38. Chapter 5: What Is Next in ICS Security? (1/5)
  39. Chapter 5: What Is Next in ICS Security? (2/5)
  40. Chapter 5: What Is Next in ICS Security? (3/5)
  41. Chapter 5: What Is Next in ICS Security? (4/5)
  42. Chapter 5: What Is Next in ICS Security? (5/5)
  43. Back Cover

Product information

  • Title: Cybersecurity for Industrial Control Systems
  • Author(s): Tyson Macaulay, Bryan L. Singer
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439801987