Custom cover image
Custom cover image

Cyber-security of SCADA and Other Industrial Control Systems / edited by Edward J. M. Colbert, Alexander Kott

Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: Advances in Information Security ; 66 | SpringerLink BücherPublisher: Cham ; s.l. : Springer International Publishing, 2016Description: Online-Ressource (XIX, 355 p. 94 illus., 60 illus. in color, online resource)ISBN:
  • 9783319321257
Subject(s): Additional physical formats: 9783319321233 | Druckausg.: 978-3-319-32123-3 LOC classification:
  • QA76.9.A25
DOI: DOI: 10.1007/978-3-319-32125-7Online resources: Summary: Introduction and Preview -- Components of Industrial Control Systems -- Wireless Infrastructure in Industrial Control Systems -- Operational Technology and Information Technology in Industrial Control Systems -- Threats in Industrial Control Systems -- Attacks on Industrial Control Systems -- Security Taxonomies of Industrial Control Systems -- Cyber Risk in Industrial Control Systems -- Security Metrics in Industrial Control Systems -- Situational Awareness in Industrial Control Systems -- Intrusion Detection in Industrial Control Systems -- Cyber Physical Intrusion Detection -- Experimental Methods for Control System Security Research -- Governance and Assessment Strategies for Industrial Control Systems -- Responding to Attacks on Industrial Control Systems and SCADA Systems -- In Conclusion: The Future Internet of Things and Security of its Control Systems.Summary: This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.PPN: PPN: 1658663276Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-SXCS | ZDB-2-SCS
No physical items for this record

Powered by Koha