Handbook of SCADA/Control Systems Security Front Cover

Handbook of SCADA/Control Systems Security

  • Length: 383 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2013-02-19
  • ISBN-10: 1466502266
  • ISBN-13: 9781466502260
  • Sales Rank: #2309773 (See Top 100 Books)
Description

The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.

Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:

  • Emerging trends and threat factors that plague the ICS security community
  • Risk methodologies and principles that can be applied to safeguard and secure an automated operation
  • Methods for determining events leading to a cyber incident, and methods for restoring and mitigating issues—including the importance of critical communications
  • The necessity and reasoning behind implementing a governance or compliance program
  • A strategic roadmap for the development of a secured SCADA/control systems environment, with examples
  • Relevant issues concerning the maintenance, patching, and physical localities of ICS equipment
  • How to conduct training exercises for SCADA/control systems

The final chapters outline the data relied upon for accurate processing, discusses emerging issues with data overload, and provides insight into the possible future direction of ISC security.

The book supplies crucial information for securing industrial automation/process control systems as part of a critical infrastructure protection program. The content has global applications for securing essential governmental and economic systems that have evolved into present-day security nightmares. The authors present a “best practices” approach to securing business management environments at the strategic, tactical, and operational levels.

Table of Contents

Chapter 1 – Introduction
Chapter 2 – Sociological and Cultural Aspects
Chapter 3 – Threat Vectors
Chapter 4 – Risk Management
Chapter 5 – Disaster Recovery and Business Continuity of SCADA
Chapter 6 – Incident Response and SCADA
Chapter 7 – Forensics Management
Chapter 8 – Governance and Compliance
Chapter 9 – Communications and Engineering Systems
Chapter 10 – Metrics Framework for a SCADA System
Chapter 11 – Network Topology and Implementation
Chapter 12 – Obsolescence and Procurement of SCADA
Chapter 13 – Patching and Change Management
Chapter 14 – Physical Security Management
Chapter 15 – Tabletop/Red– Blue Exercises
Chapter 16 – Integrity Monitoring
Chapter 17 – Data Management and Records Retention
Appendix A—Listing of Online Resources SCADA/Control Systems
Appendix B—Terms and Definitions

To access the link, solve the captcha.