Text
Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS
Contents:
1. Introduction
1.1 Where This Book Starts and Stops
1.2 Our Audience
1.3 What Is an Industrial Control System?
1.4 Is Industrial Control System Security Different Than Regular IT Security?
1.5 Where Are ICS Used?
1.6 ICS Compared to Safety Instrumented Systems
1.7 What Has Changed in ICS That Raises New Concerns?
1.8 Naming, Functionality, and Components of Typical ICS / SCADA Systems
1.9 Analogue versus IP Industrial Automation
1.10 Convergence 101: It’s Not Just Process Data Crowding onto IP
2. Convergence by Another Name
2.1 Taxonomy of Convergence
2.2 The Business Drivers of IP Convergence
2.3 Cost Drivers
2.4 Competitive Drivers
2.5 Regulatory Drivers
2.6 The Conflicting Priorities of Convergence
2.7 ICS Security Architecture and Convergence
2.8 The Discussions to Follow in This Book
3. Threats to ICS
3.1 Threats to ICS: How Security Requirements Are Different from ICS to IT
3.2 Threats to ICS
3.3 Threat-To and Threat-From
3.4 The Most Serious Threat to ICS
3.5 Hi-Jacking Malware
3.6 No Room for Amateurs
3.7 Taxonomy of Hi-Jacking Malware and Botnets
3.8 The Reproductive Cycle of Modern Malware
3.9 A Socks 4/Sock 5/HTTP Connect Proxy
3.10 SMTP Spam Engines
3.11 Porn Dialers
3.12 Conclusions on ICS Threats
4. ICS Vulnerabilities
4.1 ICS Vulnerability versus IT Vulnerabilities
4.2 Availability, Integrity, and Confidentiality
4.3 Purdue Enterprise Reference Architecture (PERA)1
4.4 Data at Rest, Data in Use, Data in Motion
4.5 Distinguishing Business, Operational, and Technical Features of ICS
4.6 ICS Vulnerabilities
4.7 Taxonomy of Vulnerabilities
4.8 ICS Technical Vulnerability Class Breakdown
4.9 IT Devices on the ICS Network
4.10 Interdependency with IT
4.11 Green Network Stacks
4.12 Protocol Inertia
4.13 Limited Processing Power and Memory Size
4.14 Storms/DOS of Various Forms
4.15 Fuzzing
4.16 MITM and Packet Injection
5. Risk Assessment Techniques
5.1 Introduction
5.2 Contemporary ICS Security Analysis Techniques
5.3 INL National SCADA Test Bed Program: Control System
5.4 Security Assessment
5.5 INL Vulnerability Assessment Methodology
5.6 INL Metrics-Based Reporting for Risk Ass
5.7 CCSP Cyber Security Evaluation Tool (CSET)8
5.8 Evolving Risk Assessment Processes
5.9 Security Assurance Level
5.10 SAL-Based Assessments
5.11 SAL Workflow
5.12 Future of SAL
5.13 Security OEE
5.14 Putting OEE Metrics Together
5.15 Network-Centric Compromise Indicators
5.16 Other Network Infrastructure That Can Be Used for Network-Centric Analysis and ICS Security
5.17 Network-Centric Assessment Caveats
6. What Is Next in ICS Security?
6.1 The Internet of Things (IOT)
6.2 IPv6
6.3 ICS v6 Test Lab Designs
6.4 IPv6 and ICS Sensors
6.5 A Few Years Yet…
No other version available