Handbook of SCADA/Control Systems Security

Handbook of SCADA/Control Systems Security
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 EPUB
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 86,83 €

Jetzt 86,82 €* EPUB

Artikel-Nr:
9781482209402
Veröffentl:
2013
Einband:
EPUB
Seiten:
383
Autor:
Jacob Brodsky
eBook Typ:
EPUB
eBook Format:
EPUB
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:Emerging trends and threat factors that plague the ICS security communityRisk methodologies and principles that can be applied to safeguard and secure an automated operationMethods for determining events leading to a cyber incident, and methods for restoring and mitigating issues-including the importance of critical communicationsThe necessity and reasoning behind implementing a governance or compliance programA strategic roadmap for the development of a secured SCADA/control systems environment, with examplesRelevant issues concerning the maintenance, patching, and physical localities of ICS equipmentHow to conduct training exercises for SCADA/control systemsThe final chapters outline the data relied upon for accurate processing, discusses emerging issues with data overload, and provides insight into the possible future direction of ISC security.The book supplies crucial information for securing industrial automation/process control systems as part of a critical infrastructure protection program. The content has global applications for securing essential governmental and economic systems that have evolved into present-day security nightmares. The authors present a "e;best practices"e; approach to securing business management environments at the strategic, tactical, and operational levels.
The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:Emerging trends and threat factors that plague the ICS security communityRisk methodologies and principles that can be applied to safeguard and secure an automated operationMethods for determining events leading to a cyber incident, and methods for restoring and mitigating issues-including the importance of critical communicationsThe necessity and reasoning behind implementing a governance or compliance programA strategic roadmap for the development of a secured SCADA/control systems environment, with examplesRelevant issues concerning the maintenance, patching, and physical localities of ICS equipmentHow to conduct training exercises for SCADA/control systemsThe final chapters outline the data relied upon for accurate processing, discusses emerging issues with data overload, and provides insight into the possible future direction of ISC security.The book supplies crucial information for securing industrial automation/process control systems as part of a critical infrastructure protection program. The content has global applications for securing essential governmental and economic systems that have evolved into present-day security nightmares. The authors present a "e;best practices"e; approach to securing business management environments at the strategic, tactical, and operational levels.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.