
Techno Security's Guide to Securing SCADA
A Comprehensive Handbook On Protecting The Critical Infrastructure
- 352 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Techno Security's Guide to Securing SCADA
A Comprehensive Handbook On Protecting The Critical Infrastructure
About this book
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.- Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure- Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures- Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more- Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Lead Author
- Contributors
- Foreword Contributor
- Foreword
- Chapter 1. Physical Security: SCADA and the Critical Infrastructure’s Biggest Vulnerability
- Chapter 2. Supervisory Control and Data Acquisition
- Chapter 3. SCADA Security Assessment Methodology
- Chapter 4. Developing an Effective Security Awareness Program
- Chapter 5. Working with Law Enforcement on SCADA Incidents
- Chapter 6. Locked but Not Secure: An Overview of Conventional and High Security Locks
- Chapter 7. Bomb Threat Planning: Things Have Changed
- Chapter 8. Biometric Authentication for SCADA Security
- Appendix. Personal, Workforce, and Family Preparedness
- Index