- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
Ships from International Warehouse (read more)
available for shipping only
Not available for In-store Pickup
Cybersecurity for Industrial Control Systems: Scada, Dcs, Plc, Hmi, and Sisby Bryan L. Singer
Synopses & Reviews
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.
Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.
Book News Annotation:
The formation of systematic protocols for managing the security of industrial control systems (ICS) has somewhat lagged behind those for IT in general, note Macaulay (security liaison officer, Bell Canada) and Singer (Kenexis Consulting Corporation) in the introduction to this clearly written, detailed guide. Addressed to both IT professionals and non-IT specialists, particularly managers, the volume offers an overview of the methods and tools used for ICS security, including process control system (PCS), distributed control system (DCS), supervisory control and data acquisition (SCADA), programmable logic controllers (PLCs), and human-machine interface (HMI). The threats and vulnerabilities of ICS are described in separate chapters, followed by a thorough discussion of risk assessment and future trends in ICS security. Annotation ©2012 Book News, Inc., Portland, OR (booknews.com)
SCADA — Supervisory Control and Data Acquisition --. Systems don t necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed cookbook that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern.
What Our Readers Are Saying
Business » General