Book description
As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are required.
Table of contents
- Front Cover
- Contents
- Authors
- Chapter 1: Introduction (1/9)
- Chapter 1: Introduction (2/9)
- Chapter 1: Introduction (3/9)
- Chapter 1: Introduction (4/9)
- Chapter 1: Introduction (5/9)
- Chapter 1: Introduction (6/9)
- Chapter 1: Introduction (7/9)
- Chapter 1: Introduction (8/9)
- Chapter 1: Introduction (9/9)
- Chapter 2: Threats to ICS (1/8)
- Chapter 2: Threats to ICS (2/8)
- Chapter 2: Threats to ICS (3/8)
- Chapter 2: Threats to ICS (4/8)
- Chapter 2: Threats to ICS (5/8)
- Chapter 2: Threats to ICS (6/8)
- Chapter 2: Threats to ICS (7/8)
- Chapter 2: Threats to ICS (8/8)
- Chapter 3: ICS Vulnerabilities (1/9)
- Chapter 3: ICS Vulnerabilities (2/9)
- Chapter 3: ICS Vulnerabilities (3/9)
- Chapter 3: ICS Vulnerabilities (4/9)
- Chapter 3: ICS Vulnerabilities (5/9)
- Chapter 3: ICS Vulnerabilities (6/9)
- Chapter 3: ICS Vulnerabilities (7/9)
- Chapter 3: ICS Vulnerabilities (8/9)
- Chapter 3: ICS Vulnerabilities (9/9)
- Chapter 4: Risk Assessment Techniques (1/8)
- Chapter 4: Risk Assessment Techniques (2/8)
- Chapter 4: Risk Assessment Techniques (3/8)
- Chapter 4: Risk Assessment Techniques (4/8)
- Chapter 4: Risk Assessment Techniques (5/8)
- Chapter 4: Risk Assessment Techniques (6/8)
- Chapter 4: Risk Assessment Techniques (7/8)
- Chapter 4: Risk Assessment Techniques (8/8)
- Chapter 5: What Is Next in ICS Security? (1/5)
- Chapter 5: What Is Next in ICS Security? (2/5)
- Chapter 5: What Is Next in ICS Security? (3/5)
- Chapter 5: What Is Next in ICS Security? (4/5)
- Chapter 5: What Is Next in ICS Security? (5/5)
- Back Cover
Product information
- Title: Cybersecurity for Industrial Control Systems
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439801987
You might also like
book
Pentesting Industrial Control Systems
Discover modern tactics, techniques, and procedures for pentesting industrial control systems Key Features Become well-versed with …
book
Industrial Network Security
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems …
book
Industrial Cybersecurity
Your one-step guide to understanding industrial cyber security, its control systems, and its operations. About This …
book
Industrial Cybersecurity - Second Edition
A second edition filled with new and improved content, taking your ICS cybersecurity journey to the …