Cybersecurity for SCADA Systems.
Material type:
- text
- computer
- online resource
- 9781593705053
- 620/.46028558
- TJ222 .S539 2020
Intro -- Contents -- Preface -- Acknowledgements -- Introduction: Industrial Automation in the Aftermath of 9/11 -- Chapter 1. The technological evolution of scada systems -- The Early History of SCADA - Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergence -- Ubiquitous Internet and IP Networking -- Generalized Software Architecture -- Chapter 2. Remote terminal units -- Basic Features and Functions -- Smart RTU Technology -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- IP-Ready RTUs and Protocols -- Chapter 3. Telecommunications technologies -- Voice-Grade (Analog) Telephony -- Commercial Voice/Data Carriers -- Options for Wireless Communications -- Digital Networking Technologies -- TCP/IP Networking. -- The Internet -- Chapter 4. Supervisory control applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Chapter 5. Operator interface -- Access-Control Mechanisms -- Standard System Displays -- Site/Industry-Specific Displays -- Historical Trending -- Logs and Reports -- Chapter 6. Conventional information technology -- Availability, Integrity, and Confidentiality -- Remote Access/ Connectivity -- TCP/IP Suite -- Firewalls & -- Routers -- Wireless LANs -- Authentication and Validation -- Encryption and Ciphers -- Chapter 7. Identifying cybersecurity vulnerabilities -- Threats and Threat Agents -- Obvious Points of Attack and Vulnerability -- Chapter 8. Malware, cyberattacks and hacking tools -- Vulnerabilities -- WEB Server/SQL Injection -- Email and Web browsing -- Malware -- Chapter 9. Physical security -- Access Controls -- Access tracking -- Illegal-entry Alarms -- Physical Isolation of Assets: Layers of Defense.
Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Remote and Field Sites -- Chapter 10. Operational security -- Policies and Administrative Controls -- Procedures -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- Chapter 11. Computer systems & -- Network security -- Chapter 12. Electric utility industry - specific cybersecurity issues -- Substation Backdoors -- IP to the Substation -- TASE.2/ICCP Connections -- UCA2 (IEC61850) -- DNP3.0 -- NERC 1200/1300 Compliance -- Chapter 13. Water/ Wastewater industry - specific cybersecurity issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory and Local Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- Chapter 14. Pipeline industry - specific cybersecurity issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and Email Integration -- Chapter 15. The cyberthreat to scada systems -- Chapter 16. Commercial product vulnerabilities -- Appendix A U. S. Department of Energy's "21 Steps to Improved SCADA Security" -- Appendix B. NERC CIP - Recommendations for Electric Utilities -- Appendix C. Security Recommendations of the Instruments, Systems, and Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D. Industry and Government Security Recommendations -- Appendix E. SCADA System Security Assessment Checklists -- Glossary -- Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.