SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault
Cybersecurity for SCADA Systems
β Scribed by William T. Shaw
- Publisher
- PennWell Books
- Year
- 2021
- Tongue
- English
- Leaves
- 523
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition also takes advantage of the evolved industry-specific cybersecurity standards that have emerged, especially in the electric power and oil-and-gas pipeline industry sectors.Β
Cybersecurity for SCADA Systems, 2nd EditionΒ is intended to provide a general background of SCADA system technology and cybersecurity concepts and technologies, showing how the two can be brought together to safeguard our infrastructure and computer automation systems. This book provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues and learn strategies for decreasing or eliminating system vulnerabilities. Cybersecurity for SCADA Systems, 2nd Edition is suitable for nontechnical, management-level personnel as well as IT personnel without SCADA experience.Β
Features and Benefits
- Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system
- IT and cybersecurity technology and terminology overview and explanation
- Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies
- Discussion of physical and electronic security issues and strategies
Audience
- IT personnel
- Management
- Students
β¦ Table of Contents
Contents
Preface
Acknowledgements
Introduction: Industrial Automation in the Aftermath of 9/11
Chapter 1. The technological evolution of scada systems
The Early History of SCADA β Mainframes
Minicomputers and Microprocessors
Central Architectures
Distributed Architectures
Client/Server Designs
Technological Convergence
Ubiquitous Internet and IP Networking
Generalized Software Architecture
Chapter 2. Remote terminal units
Basic Features and Functions
Smart RTU Technology
Top-Down and Bottom-Up Configuration
The Emergence of PLCs
Legacy Protocols
Protocol Standards
IP-Ready RTUs and Protocols
Chapter 3. Telecommunications technologies
Voice-Grade (Analog) Telephony
Commercial Voice/Data Carriers
Options for Wireless Communications
Digital Networking Technologies
TCP/IP Networking.
The Internet
Chapter 4. Supervisory control applications
Operating System Utilities
SCADA System Utilities
Program Development Tools
Standardized APIs
Chapter 5. Operator interface
Access-Control Mechanisms
Standard System Displays
Site/Industry-Specific Displays
Historical Trending
Logs and Reports
Chapter 6. Conventional information technology
Availability, Integrity, and Confidentiality
Remote Access/ Connectivity
TCP/IP Suite
Firewalls & Routers
Wireless LANs
Authentication and Validation
Encryption and Ciphers
Chapter 7. Identifying cybersecurity vulnerabilities
Threats and Threat Agents
Obvious Points of Attack and Vulnerability
Chapter 8. Malware, cyberattacks and hacking tools
Vulnerabilities
WEB Server/SQL Injection
Email and Web browsing
Malware
Chapter 9. Physical security
Access Controls
Access tracking
Illegal-entry Alarms
Physical Isolation of Assets: Layers of Defense
Physical Protection of Materials and Information
Critical Ancillary Subsystems
Remote and Field Sites
Chapter 10. Operational security
Policies and Administrative Controls
Procedures
Operational Differences
Training
Recovery Procedures
Annual Review
Background Checks
Chapter 11. Computer systems & Network security
Chapter 12. Electric utility industry β specific cybersecurity issues
Substation Backdoors
IP to the Substation
TASE.2/ICCP Connections
UCA2 (IEC61850)
DNP3.0
NERC 1200/1300 Compliance
Chapter 13. Water/ Wastewater industry β specific cybersecurity issues
Licensed Radio Communications
Nonsecure Protocols
PLC Equipment as RTUs
Supervisory and Local Control Applications
Municipal LANs and WANs
Control Interfaces to Plant Control Systems
Chapter 14. Pipeline industry β specific cybersecurity issues
Radio Communications
Smart RTUs
RTU Program Logic
Supervisory Control Applications
IP along the Pipeline
Web Browsing and Email Integration
Chapter 15. The cyberthreat to scada systems
Chapter 16. Commercial product vulnerabilities
Appendix A U. S. Department of Energy's β21 Steps to Improved SCADA Securityβ
Appendix B. NERC CIP β Recommendations for Electric Utilities
Appendix C. Security Recommendations of the Instruments, Systems, and Automation Society and the American Gas Association
Recommendations of the AGA
Appendix D. Industry and Government Security Recommendations
Appendix E. SCADA System Security Assessment Checklists
Glossary
Index
π SIMILAR VOLUMES
SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault
This eBook will provide Critical Infrastructure customers and academic students an understanding of the NIST Cybersecurity Critical Infrastructure Framework and how to apply the framework to new and existing SCADA applications and implementations. Purpose: Provide Critical Infrastructure customers
<P>As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with i
<p>This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automat
<p><span>This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain