
- 499 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cybersecurity for SCADA Systems
About this book
The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition also takes advantage of the evolved industry-specific cybersecurity standards that have emerged, especially in the electric power and oil-and-gas pipeline industry sectors.
Cybersecurity for SCADA Systems, 2nd Edition is intended to provide a general background of SCADA system technology and cybersecurity concepts and technologies, showing how the two can be brought together to safeguard our infrastructure and computer automation systems. This book provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues and learn strategies for decreasing or eliminating system vulnerabilities. Cybersecurity for SCADA Systems, 2nd Edition is suitable for nontechnical, management-level personnel as well as IT personnel without SCADA experience.
Features and Benefits
- Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system
- IT and cybersecurity technology and terminology overview and explanation
- Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies
- Discussion of physical and electronic security issues and strategies
Audience
- IT personnel
- Management
- Students
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Contents
- Figures
- Tables
- Preface
- Acknowledgements
- Industrial Automation in the Aftermath of 9/11
- 1 - The technological evolution of scada systems
- 2 - Remote terminal units
- 3 - Telecommunications technologies
- 4 - Supervisory control applications
- 5 - Operator interface
- 6 - Conventional information technology
- 7 - Identifying cybersecurity vulnerabilities
- 8 - Malware, cyberattacks and hacking tools
- 9 - Physical security
- 10 - Operational security
- 11 - Computer systems & Network security
- 12 - Electric utility industry– specific cybersecurity issues
- 13 - Water/Wastewater industry– specific cybersecurity issues
- 14 - Pipeline industry– specific cybersecurity issues
- 15 - The cyberthreat to scada systems
- 16 - Commercial product vulnerabilities
- Appendix A - U.S. Department of Energy's “21 Steps to Improved SCADA Security”
- Appendix B - NERC CIP—Recommendations for Electric Utilities
- Appendix C - Security Recommendations of the Instruments, Systems, and Automation Society and the American Gas Association
- Appendix D - Industry and Government Security Recommendations
- Appendix E - SCADA System Security Assessment Checklists
- Glossary
- Index