logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS (Hardcover, UK)

Tyson Macaulay (지은이)
Auerbach Pub
193,980원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
159,060원 -18% 0원
7,960원
151,100원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
eBook 미리보기

책 정보

· 제목 : Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS (Hardcover, UK) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9781439801963
· 쪽수 : 204쪽
· 출판일 : 2011-12-21

목차

Introduction
Where This Book Starts and Stops
Our Audience
What Is an Industrial Control System?
Is Industrial Control System Security Different Than Regular IT Security?
Where Are ICS Used?
ICS Compared to Safety Instrumented Systems
What Has Changed in ICS That Raises New Concerns?
Naming, Functionality, and Components of Typical ICS / SCADA Systems
Analogue versus IP Industrial Automation
Convergence 101: It’s Not Just Process Data Crowding onto IP

Convergence by Another Name
Taxonomy of Convergence
The Business Drivers of IP Convergence
Cost Drivers
Competitive Drivers
Regulatory Drivers
The Conflicting Priorities of Convergence
ICS Security Architecture and Convergence
The Discussions to Follow in This Book
Endnotes

Threats to ICS
Threats to ICS: How Security Requirements Are Different from ICS to IT
Threats to ICS
Threat-To and Threat-From
The Most Serious Threat to ICS
Hi-Jacking Malware
No Room for Amateurs
Taxonomy of Hi-Jacking Malware and Botnets
The Reproductive Cycle of Modern Malware
A Socks 4/Sock 5/HTTP Connect Proxy
SMTP Spam Engines
Porn Dialers
Conclusions on ICS Threats
Endnotes

ICS Vulnerabilities
ICS Vulnerability versus IT Vulnerabilities
Availability, Integrity, and Confidentiality
Purdue Enterprise Reference Architecture (PERA)1
Data at Rest, Data in Use, Data in Motion
Distinguishing Business, Operational, and Technical Features of ICS
ICS Vulnerabilities
Taxonomy of Vulnerabilities
ICS Technical Vulnerability Class Breakdown
IT Devices on the ICS Network
Interdependency with IT
Green Network Stacks
Protocol Inertia
Limited Processing Power and Memory Size
Storms/DOS of Various Forms
Fuzzing
MITM and Packet Injection
Summary
Endnotes

Risk Assessment Techniques
Introduction
Contemporary ICS Security Analysis Techniques
INL National SCADA Test Bed Program: Control System
Security Assessment
INL Vulnerability Assessment Methodology
INL Metrics-Based Reporting for Risk Ass
CCSP Cyber Security Evaluation Tool (CSET)8
Evolving Risk Assessment Processes
Security Assurance Level
SAL-Based Assessments
SAL Workflow
Future of SAL
Security OEE
Putting OEE Metrics Together
Network-Centric Compromise Indicators
Other Network Infrastructure That Can Be Used for Network-Centric Analysis and ICS Security
Network-Centric Assessment Caveats
Conclusion
Endnotes

What Is Next in ICS Security?
The Internet of Things (IOT)
IPv6
ICS v6 Test Lab Designs
IPv6 and ICS Sensors
A Few Years Yet…
Endnotes

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책