Cyber-security of SCADA and Other Industrial Control Systems [electronic resource] / edited by Edward J. M. Colbert, Alexander Kott.
Contributor(s): Colbert, Edward J. M [editor.] | Kott, Alexander [editor.] | SpringerLink (Online service).
Material type: BookSeries: Advances in Information Security: 66Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Description: XIX, 355 p. 94 illus., 60 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319321257.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Computers | Computer Science | Systems and Data Security | Computer Communication Networks | Information Systems and Communication Service | Data EncryptionAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access onlineIntroduction and Preview -- Components of Industrial Control Systems -- Wireless Infrastructure in Industrial Control Systems -- Operational Technology and Information Technology in Industrial Control Systems -- Threats in Industrial Control Systems -- Attacks on Industrial Control Systems -- Security Taxonomies of Industrial Control Systems -- Cyber Risk in Industrial Control Systems -- Security Metrics in Industrial Control Systems -- Situational Awareness in Industrial Control Systems -- Intrusion Detection in Industrial Control Systems -- Cyber Physical Intrusion Detection -- Experimental Methods for Control System Security Research -- Governance and Assessment Strategies for Industrial Control Systems -- Responding to Attacks on Industrial Control Systems and SCADA Systems -- In Conclusion: The Future Internet of Things and Security of its Control Systems.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.
There are no comments for this item.