SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault
Framework for SCADA Cybersecurity ePub
β Scribed by Richard Clark
- Publisher
- InduSoft
- Year
- 2015
- Tongue
- English
- Leaves
- 197
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This eBook will provide Critical Infrastructure customers and academic students an understanding of the NIST Cybersecurity Critical Infrastructure Framework and how to apply the framework to new and existing SCADA applications and implementations.
Purpose: Provide Critical Infrastructure customers and academic students an understanding of the NIST Cybersecurity Critical Infrastructure Framework and how to apply the framework to new and existing SCADA applications and implementations.
The objectives of this book are as follows
1. Establish an overview and introduction of the EO13636 Improving Critical Infrastructure Cybersecurity.
2. Provide knowledge, understanding, and application of the five functions of the framework.
3. Apply tools and standards to enable the framework implementation.
4. Apply industry security recommendations to meet the framework categories.
This eBook is being used as a class textbook in the Cybersecurity Curriculum at Eastern New Mexico University - Ruidoso taught by Professor Stephen Miller
β¦ Table of Contents
Abstract
Copyright and Foundation Information
Foreword
Table of Contents
Chapter 1: SCADA Cybersecurity Introduction and Review
Chapter 2: Cybersecurity Framework Introduction
Chapter 3: Cybersecurity Framework Basics
Chapter 4: How to Use the Framework
Chapter 5: InduSoft Security Guide
Appendix A: Framework Core
Appendix B: Cyber Security Evaluation Tool (CSET) Information
Appendix C: References
Appendix D: Glossary
Endnotes
About the Authors and More Information
π SIMILAR VOLUMES
SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault
<p>The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATAβIN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-ba
Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organisations, the defenc