Skip to Main Content
Handbook of SCADA/Control Systems Security
book

Handbook of SCADA/Control Systems Security

by Robert Radvanovsky, Jacob Brodsky
April 2016
Intermediate to advanced content levelIntermediate to advanced
383 pages
13h 29m
English
CRC Press
Content preview from Handbook of SCADA/Control Systems Security
331Integrity Monitoring
6. Was it the attempt to access the system successful? (And if yes, how much
data was retrieved? What may have been changed?)
The evidence available to the reviewer is provided:
• Within the client system (this may be infeasible—such as in web-based
commerce systems)
• Within the system (including the logs produced by the system that are sent
to a remote system)
• Between the client and the system (such as rewall logs, IDS/IPS devices,
and host-based events and logs)
More and more we need to start looking to network-based controls to protect and log
SCADA systems.
Auditing within the client entails using the evidence available on the client itself.
Client systems can hold a wealth of system access tools and the logs ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
Techno Security's Guide to Securing SCADA

Techno Security's Guide to Securing SCADA

Greg Miles, Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson, Sean Lowther, Marc Weber Tobias, James H. Windle

Publisher Resources

ISBN: 9781466502260