Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS
Bookmark Share

Text

Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS

Macaulay, Tyson - Personal Name; Singer, Bryan - Personal Name;

Contents:
1. Introduction
1.1 Where This Book Starts and Stops
1.2 Our Audience
1.3 What Is an Industrial Control System?
1.4 Is Industrial Control System Security Different Than Regular IT Security?
1.5 Where Are ICS Used?
1.6 ICS Compared to Safety Instrumented Systems
1.7 What Has Changed in ICS That Raises New Concerns?
1.8 Naming, Functionality, and Components of Typical ICS / SCADA Systems
1.9 Analogue versus IP Industrial Automation
1.10 Convergence 101: It’s Not Just Process Data Crowding onto IP

2. Convergence by Another Name
2.1 Taxonomy of Convergence
2.2 The Business Drivers of IP Convergence
2.3 Cost Drivers
2.4 Competitive Drivers
2.5 Regulatory Drivers
2.6 The Conflicting Priorities of Convergence
2.7 ICS Security Architecture and Convergence
2.8 The Discussions to Follow in This Book

3. Threats to ICS
3.1 Threats to ICS: How Security Requirements Are Different from ICS to IT
3.2 Threats to ICS
3.3 Threat-To and Threat-From
3.4 The Most Serious Threat to ICS
3.5 Hi-Jacking Malware
3.6 No Room for Amateurs
3.7 Taxonomy of Hi-Jacking Malware and Botnets
3.8 The Reproductive Cycle of Modern Malware
3.9 A Socks 4/Sock 5/HTTP Connect Proxy
3.10 SMTP Spam Engines
3.11 Porn Dialers
3.12 Conclusions on ICS Threats

4. ICS Vulnerabilities
4.1 ICS Vulnerability versus IT Vulnerabilities
4.2 Availability, Integrity, and Confidentiality
4.3 Purdue Enterprise Reference Architecture (PERA)1
4.4 Data at Rest, Data in Use, Data in Motion
4.5 Distinguishing Business, Operational, and Technical Features of ICS
4.6 ICS Vulnerabilities
4.7 Taxonomy of Vulnerabilities
4.8 ICS Technical Vulnerability Class Breakdown
4.9 IT Devices on the ICS Network
4.10 Interdependency with IT
4.11 Green Network Stacks
4.12 Protocol Inertia
4.13 Limited Processing Power and Memory Size
4.14 Storms/DOS of Various Forms
4.15 Fuzzing
4.16 MITM and Packet Injection

5. Risk Assessment Techniques
5.1 Introduction
5.2 Contemporary ICS Security Analysis Techniques
5.3 INL National SCADA Test Bed Program: Control System
5.4 Security Assessment
5.5 INL Vulnerability Assessment Methodology
5.6 INL Metrics-Based Reporting for Risk Ass
5.7 CCSP Cyber Security Evaluation Tool (CSET)8
5.8 Evolving Risk Assessment Processes
5.9 Security Assurance Level
5.10 SAL-Based Assessments
5.11 SAL Workflow
5.12 Future of SAL
5.13 Security OEE
5.14 Putting OEE Metrics Together
5.15 Network-Centric Compromise Indicators
5.16 Other Network Infrastructure That Can Be Used for Network-Centric Analysis and ICS Security
5.17 Network-Centric Assessment Caveats

6. What Is Next in ICS Security?
6.1 The Internet of Things (IOT)
6.2 IPv6
6.3 ICS v6 Test Lab Designs
6.4 IPv6 and ICS Sensors
6.5 A Few Years Yet…


Availability
#
Perpustakaan Poltek SSN (Rak 600) 658.4 MAC c
b0000027
Available - Circulation
#
Perpustakaan Poltek SSN (Rak 600) 658.4 MAC c/2
b0001276
Available - Available
Detail Information
Series Title
--
Call Number
658.4 MAC c
Publisher
Boca Raton : CRC Press., 2012
Collation
x, 192 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9781439801963
Classification
658.4
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Process control -- Security measures
Specific Detail Info
--
Statement of Responsibility
Tyson Macaulay dan Bryan Singer
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?