ORPP logo
Image from Google Jackets

Cybersecurity for SCADA Systems.

By: Material type: TextTextPublisher: Tulsa, OK : PennWell Books, LLC, 2021Copyright date: ©2021Edition: 2nd edDescription: 1 online resource (523 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781593705053
Subject(s): Genre/Form: Additional physical formats: Print version:: Cybersecurity for SCADA SystemsDDC classification:
  • 620/.46028558
LOC classification:
  • TJ222 .S539 2020
Online resources:
Contents:
Intro -- Contents -- Preface -- Acknowledgements -- Introduction: Industrial Automation in the Aftermath of 9/11 -- Chapter 1. The technological evolution of scada systems -- The Early History of SCADA - Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergence -- Ubiquitous Internet and IP Networking -- Generalized Software Architecture -- Chapter 2. Remote terminal units -- Basic Features and Functions -- Smart RTU Technology -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- IP-Ready RTUs and Protocols -- Chapter 3. Telecommunications technologies -- Voice-Grade (Analog) Telephony -- Commercial Voice/Data Carriers -- Options for Wireless Communications -- Digital Networking Technologies -- TCP/IP Networking. -- The Internet -- Chapter 4. Supervisory control applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Chapter 5. Operator interface -- Access-Control Mechanisms -- Standard System Displays -- Site/Industry-Specific Displays -- Historical Trending -- Logs and Reports -- Chapter 6. Conventional information technology -- Availability, Integrity, and Confidentiality -- Remote Access/ Connectivity -- TCP/IP Suite -- Firewalls &amp -- Routers -- Wireless LANs -- Authentication and Validation -- Encryption and Ciphers -- Chapter 7. Identifying cybersecurity vulnerabilities -- Threats and Threat Agents -- Obvious Points of Attack and Vulnerability -- Chapter 8. Malware, cyberattacks and hacking tools -- Vulnerabilities -- WEB Server/SQL Injection -- Email and Web browsing -- Malware -- Chapter 9. Physical security -- Access Controls -- Access tracking -- Illegal-entry Alarms -- Physical Isolation of Assets: Layers of Defense.
Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Remote and Field Sites -- Chapter 10. Operational security -- Policies and Administrative Controls -- Procedures -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- Chapter 11. Computer systems &amp -- Network security -- Chapter 12. Electric utility industry - specific cybersecurity issues -- Substation Backdoors -- IP to the Substation -- TASE.2/ICCP Connections -- UCA2 (IEC61850) -- DNP3.0 -- NERC 1200/1300 Compliance -- Chapter 13. Water/ Wastewater industry - specific cybersecurity issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory and Local Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- Chapter 14. Pipeline industry - specific cybersecurity issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and Email Integration -- Chapter 15. The cyberthreat to scada systems -- Chapter 16. Commercial product vulnerabilities -- Appendix A U. S. Department of Energy's "21 Steps to Improved SCADA Security" -- Appendix B. NERC CIP - Recommendations for Electric Utilities -- Appendix C. Security Recommendations of the Instruments, Systems, and Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D. Industry and Government Security Recommendations -- Appendix E. SCADA System Security Assessment Checklists -- Glossary -- Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Contents -- Preface -- Acknowledgements -- Introduction: Industrial Automation in the Aftermath of 9/11 -- Chapter 1. The technological evolution of scada systems -- The Early History of SCADA - Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergence -- Ubiquitous Internet and IP Networking -- Generalized Software Architecture -- Chapter 2. Remote terminal units -- Basic Features and Functions -- Smart RTU Technology -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- IP-Ready RTUs and Protocols -- Chapter 3. Telecommunications technologies -- Voice-Grade (Analog) Telephony -- Commercial Voice/Data Carriers -- Options for Wireless Communications -- Digital Networking Technologies -- TCP/IP Networking. -- The Internet -- Chapter 4. Supervisory control applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Chapter 5. Operator interface -- Access-Control Mechanisms -- Standard System Displays -- Site/Industry-Specific Displays -- Historical Trending -- Logs and Reports -- Chapter 6. Conventional information technology -- Availability, Integrity, and Confidentiality -- Remote Access/ Connectivity -- TCP/IP Suite -- Firewalls &amp -- Routers -- Wireless LANs -- Authentication and Validation -- Encryption and Ciphers -- Chapter 7. Identifying cybersecurity vulnerabilities -- Threats and Threat Agents -- Obvious Points of Attack and Vulnerability -- Chapter 8. Malware, cyberattacks and hacking tools -- Vulnerabilities -- WEB Server/SQL Injection -- Email and Web browsing -- Malware -- Chapter 9. Physical security -- Access Controls -- Access tracking -- Illegal-entry Alarms -- Physical Isolation of Assets: Layers of Defense.

Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Remote and Field Sites -- Chapter 10. Operational security -- Policies and Administrative Controls -- Procedures -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- Chapter 11. Computer systems &amp -- Network security -- Chapter 12. Electric utility industry - specific cybersecurity issues -- Substation Backdoors -- IP to the Substation -- TASE.2/ICCP Connections -- UCA2 (IEC61850) -- DNP3.0 -- NERC 1200/1300 Compliance -- Chapter 13. Water/ Wastewater industry - specific cybersecurity issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory and Local Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- Chapter 14. Pipeline industry - specific cybersecurity issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and Email Integration -- Chapter 15. The cyberthreat to scada systems -- Chapter 16. Commercial product vulnerabilities -- Appendix A U. S. Department of Energy's "21 Steps to Improved SCADA Security" -- Appendix B. NERC CIP - Recommendations for Electric Utilities -- Appendix C. Security Recommendations of the Instruments, Systems, and Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D. Industry and Government Security Recommendations -- Appendix E. SCADA System Security Assessment Checklists -- Glossary -- Index.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.