Securing Scada Systems

Securing Scada Systems
-0 %
Besorgungstitel - wird vorgemerkt | Lieferzeit: Besorgungstitel - Lieferbar innerhalb von 10 Werktagen I

Unser bisheriger Preis:ORGPRICE: 60,50 €

Jetzt 60,49 €*

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9780764597879
Veröffentl:
2005
Erscheinungsdatum:
01.11.2005
Seiten:
240
Autor:
Ronald L Krutz
Gewicht:
467 g
Format:
238x193x19 mm
Sprache:
Englisch
Beschreibung:

RONALD L. KRUTZ , PhD, P. E., CISSP, ISSEP, is Senior Information Security Researcher for Lockheed Martin Information Technologies. He has worked with distributed computing systems, computer architectures, real-time systems, and information security for more than forty years. Dr. Krutz founded the Carnegie Mellon Research Institute Cybersecurity Center and is coauthor of the bestselling CISSP Prep Guide , also published by Wiley.
* Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems
* Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage-and what can be done to prevent this from happening
* Examines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets
This book examines the history of SCADA systems, their proliferation in the U.S. critical infrastructure, their unique real-time operating and performance requirements, and the evolution of SCADA protocols to provide access to external networks.
About the Author.
Acknowledgments.

Introduction.

Chapter 1: What Is a SCADA System?

Chapter 2: SCADA Systems in the Critical Infrastructure

Chapter 3: The Evolution of SCADA Protocols.

Chapter 4: SCADA Vulnerabilities and Attacks.

Chapter 5: SCADA Security Methods and Techniques.

Chapter 6: SCADA Security Standards and Reference Documents.

Chapter 7: SCADA Security Management Implementation Issues and Guidelines.

Chapter 8: Where We Stand Today.

Appendix A: Acronyms and Abbreviations.

Appendix B: System Protection Profile - Industrial Control Systems.

Appendix C: Bibliography.

Index.
Lieferung vom Verlag mit leichten Qualitätsmängeln möglich

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.