Securing SCADA Systems

Specificaties
Gebonden, 218 blz. | Engels
Wiley Computing | 1e druk, 2006
ISBN13: 9780764597879
Rubricering
Hoofdrubriek : Computer en informatica
Wiley Computing 1e druk, 2006 9780764597879
Gratis verzonden | Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, system a security nightmare.

In the first guidebook to specifically address this vital problem, a veteran system security expert shows you how SCADA systems have developed and how to understand their components and architecture, recognize risks and vulnerabilities, and learn to use appropriate protocols and countermeasures to protect vital information from cyber-terrorism.

Learn how to make SCADA systems safe:
- Understand SCADA system architectures and components
- Recognize breaches in security and what makes SCADA systems vulnerable
- See how SCADA security is critical at every level, from a small town's water supply to natural gas pipelines, oil refineries, and nuclear power plants
- Examine system architecture and understand how if contributes to security or vulnerability
- Explore effective countermeasures and safeguards and see ho to apply them in your organization
- Understand why need security measures are not being used in some operations
- Analyze your situation and take appropriate steps

Specificaties

ISBN13:9780764597879
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:218
Druk:1

Inhoudsopgave

About the Author
Acknowledgments
Introduction

1. What Is a SCADA System?
2. SCADA Systems in the Critical Infrastructure
3. The Evolution of SCADA Protocols.
4. SCADA Vulnerabilities and Attacks.
5. SCADA Security Methods and Techniques.
6. SCADA Security Standards and Reference Documents.
7. SCADA Security Management Implementation Issues and Guidelines.
8. Where We Stand Today.

Appendix A: Acronyms and Abbreviations.
Appendix B: System Protection Profile - Industrial Control Systems.
Appendix C: Bibliography.

Index.

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Securing SCADA Systems