Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Knapp, Eric D.
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. Author Eric Knapp examines the unique protocols and applications that are the foundation of Industrial Control Systems (ICS) and provides clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems such as Trisis, Industroyer, Incontroller, and moreNew information on Risk Management to better address cyber-physical systems and the risks associated with cyber-physical attacksIncludes all-new content on OT attack methodology, USB security, OT Cyber Kill Chains, Incident Response lifecycles, and moreProvides improved guidance for implementing security controls and risk mitigation strategies, including expanded coverage of network segmentation, monitoring, and threat detectionIncludes new coverage of network spans, mirrors, and taps, as well as asset discovery, log collection, and industrial-focused SIEM solution INDICE: 1. Introduction2. About Industrial Networks3. Industrial Cyber Security History and Trends4. Introduction to Industrial Control Systems and Operations5. Industrial Network Design and Architecture6. Industrial Network Protocols7. Hacking Industrial Control Systems8. USB Security (NEW chapter) 9. Risk and Vulnerability Assessments10. Establishing Zones and Conduits11. Implementing Security and Access Controls12. Exception, Anomaly, and Threat Detection13. Security Monitoring of Industrial Control Systems14. Closing the Gap - Discussing OT Cyber Kill Chains, and the lifecycle of an incident response from detection to recoveryAppendixA. Protocol ResourcesB. Standards OrganizationsC. NIST Security Guidelines
- ISBN: 978-0-443-13737-2
- Editorial: Syngress
- Encuadernacion: Rústica
- Páginas: 518
- Fecha Publicación: 28/03/2024
- Nº Volúmenes: 1
- Idioma: