Book description
Your one-step guide to understanding industrial cyber security, its control systems, and its operations.
About This Book
- Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
- Filled with practical examples to help you secure critical infrastructure systems efficiently
- A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems
Who This Book Is For
If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful.
What You Will Learn
- Understand industrial cybersecurity, its control systems and operations
- Design security-oriented architectures, network segmentation, and security support services
- Configure event monitoring systems, anti-malware applications, and endpoint security
- Gain knowledge of ICS risks, threat detection, and access management
- Learn about patch management and life cycle management
- Secure your industrial control systems from design through retirement
In Detail
With industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.
Style and approach
A step-by-step guide to implement Industrial Cyber Security effectively.
Publisher resources
Table of contents
- Preface
- Industrial Control Systems
- Insecure by Inheritance
- Anatomy of an ICS Attack Scenario
- Industrial Control System Risk Assessment
- The Purdue Model and a Converged Plantwide Ethernet
- The Defense-in-depth Model
- Physical ICS Security
-
ICS Network Security
-
Designing network architectures for security
- Network segmentation
- Resiliency and redundancy
- Architectural overview
- Firewalls
- Security monitoring and logging
- Network packet capturing
- Event logging
- Security information and event management
- Summary
-
Designing network architectures for security
- ICS Computer Security
- ICS Application Security
- ICS Device Security
-
The ICS Cybersecurity Program Development Process
- The NIST Guide to Industrial control systems security
-
The ICS security program development process
- Security policies, standards, guidelines, and procedures
- Defining ICS-specific security policies, standards, and procedures
- Defining and inventorying the ICS assets
- Performing an initial risk assessment on discovered ICS assets
- Defining and prioritizing mitigation activities
- Defining and kicking off the security improvement cycle
- Summary
Product information
- Title: Industrial Cybersecurity
- Author(s):
- Release date: October 2017
- Publisher(s): Packt Publishing
- ISBN: 9781788395151
You might also like
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
Developing Cybersecurity Programs and Policies, Third Edition
All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best …
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …
book
Learning Malware Analysis
Understand malware analysis and its practical implementation About This Book Explore the key concepts of malware …