
- 238 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
How to Be OT Cybersecurity Professional
About this book
It's a bitter truth that we live in an age of vulnerable systems, where our existence is completely dependent on them. Cyber attacks can cause greater damage than actual war losses for a country that is unprepared for them. After several incidents that impacted social order, governments have realized this fact.During a cyber attack, the city will be paralyzed, food supply will be interrupted, and medical care will be disrupted. There would be human casualties and the worst of the people would emerge if fuel or electricity were unavailable.The age of cyber missiles has arrived, and as Dale Peterson pointed out, our infrastructure systems are insecure by design. We need to learn how to secure all operational technology, it's crucial, and it can only be done by understanding the bits and bytes of these operations. In this book, you'll learn Cybersecurity for Operational Technology, how to secure all types of Operational Technology, and how to save lives!
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access How to Be OT Cybersecurity Professional by Nebras Alqurashi in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.
Information
Table of contents
- Title Page
- About the Author
- Dedication
- Copyright Information ©
- Acknowledgement
- Introduction
- How to Read This Book?
- Who Is This Book For?
- Part 1: Fundamentals of OT
- Chapter 1: The Mission
- Chapter 2: Automation
- Chapter 3: Distributed Control Systems (DCS)
- Chapter 4: SCADA
- Chapter 5: Operational Technology (OT)
- Part 2: Architecture and Communications
- Chapter 6: OT Network Architecture
- Chapter 7: IoT and IIoT
- Chapter 8: Introduction to OT Network Protocols
- Part 3: Common Industries
- Chapter 9: Electrical Power Substations and IEC61850
- Chapter 10: Oil and Gas (O&G)
- Chapter 11: Building Management Systems (BMS)
- Part 4
- Chapter 12: OT Cybersecurity Standards and Regulations
- Chapter 13: Risk Assessment
- Chapter 14: OT Cybersecurity Controls
- References