SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault
Cybersecurity for SCADA Systems
โ Scribed by Shaw, William T.
- Publisher
- PennWell
- Year
- 2006
- Tongue
- English
- Leaves
- 543
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault is becoming a test of will, cleverness and determination. Suitable for non-technical management and IT personnel, this book provides a high-level overview of SCADA technology, with an explanation of each market segment. Readers will understand the vital issues, and learn strategies for decreasing or eliminating system vulnerabilities.
Content:
Front Matter
Introduction - Industrial Automation in the Aftermath of 9/11
Preface
Table of Contents
Section 1. Introduction to SCADA Systems 1. The Technological Evolution of SCADA Systems
2. Remote Terminal Units
3. Telecommunications Technologies
4. Supervisory Control Applications
5. Operator Interface
6. Conventional Information Technology Security
Section 2. Cybersecurity Principles, Processes, and Technologies 7. Identifying Cybersecurity Vulnerabilities
8. Classifying Cyber Attacks and Cyber Threats
9. Physical Security
10. Operational Security
11. Electronic/Systems Security
12. Electric Utility Industry-Specific Cybersecurity Issues
Section 3. Industrial Sectors 13. Water/Wastewater Industry-Specific Cybersecurity Issues
14. Pipeline Industry-Specific Cybersecurity Issues
15. The Emerging Cyber Threat to SCADA Systems
Section 4. SCADA Security Architectures 16. Commercial Hardware and Software Vulnerabilities
17. Traditional Security Features of SCADA Systems
18. Eliminating the Vulnerabilities of SCADA Systems
Appendices
Glossary
Index
๐ SIMILAR VOLUMES
<p>The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition
This eBook will provide Critical Infrastructure customers and academic students an understanding of the NIST Cybersecurity Critical Infrastructure Framework and how to apply the framework to new and existing SCADA applications and implementations. Purpose: Provide Critical Infrastructure customers
<P>As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with i
<p>This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automat
<p><span>This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain