Cybersecurity for SCADA systems

Saved in:
Bibliographic Details
Main Author: Shaw, William T.
Format: eBook
Language: English
Published: Tulsa, Okla. : PennWell Corp., ©2006.
Series: Knovel Library.
Subjects:
ISBN: 9781615839773
1615839771
1593700687
9781593700683
Physical Description: 1 online resource (xviii, 562 pages) : illustrations

Cover

Table of contents

LEADER 08659cam a2200397 a 4500
001 kn-ocn743006497
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 110727s2006 okua o 001 0 eng d
040 |a KNOVL  |b eng  |e pn  |c KNOVL  |d OCLCQ  |d DEBSZ  |d ZCU  |d OCLCQ  |d KNOVL  |d E7B  |d OCLCF  |d OCLCQ  |d STF  |d VT2  |d OCLCQ  |d OCLCA  |d BUF  |d REB  |d CEF  |d RRP  |d COO  |d AU@  |d WYU  |d OCLCO  |d OCLCQ  |d NTE  |d OCLCA  |d OCLCO  |d OCLCQ  |d OCLCL  |d SXB 
020 |a 9781615839773  |q (electronic bk.) 
020 |a 1615839771  |q (electronic bk.) 
020 |z 1593700687  |q (hardcover) 
020 |z 9781593700683  |q (hardcover) 
035 |a (OCoLC)743006497  |z (OCoLC)646849523  |z (OCoLC)961883003  |z (OCoLC)988653754  |z (OCoLC)999408541  |z (OCoLC)1026426893  |z (OCoLC)1058075563  |z (OCoLC)1065647482 
100 1 |a Shaw, William T.  |q (William Tim) 
245 1 0 |a Cybersecurity for SCADA systems /  |c William T. Shaw. 
260 |a Tulsa, Okla. :  |b PennWell Corp.,  |c ©2006. 
300 |a 1 online resource (xviii, 562 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 0 |a Machine derived contents note: Contents -- Preface -- Acknowledgments -- Introduction -- Industrial Automation in the Aftermath of 9/11 -- Section 1: Introduction to SCADA Systems -- 1 The Technological Evolution of SCADA Systems -- Early History of SCADA-Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergences -- Generalized Software Architecture -- 2 Remote Terminal Units -- Basic Features and Functions -- Analog inputs -- Analog outputs -- Status inputs -- Contact outputs -- Pulse inputs -- Pulse outputs -- Smart RTU Technologies -- Serial ports -- Local display -- Downloaded logic and parameters -- Regulatory and sequence control -- Low-power operation -- Accumulator freeze -- Global Positioning System time receivers -- Daylight savings time -- Transducer-less AC inputs -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- Network versus serial protocols -- Encapsulated protocols -- IP-Ready RTUs and Protocols -- 3 Telecommunications Technologies -- Voice-Grade (Analog) Telephony -- Telephone technology -- Licensed radio -- Communications backup -- Private telephone systems -- Commercial Voice/Data Carriers -- X.25 packet switching networks -- The digital telephone company -- T1/T3 circuits -- Integrated service digital network -- Frame relay -- DSL technologies -- Options for Wireless Communications -- WiFi and WiMAX -- Cellular -- Digital Networking Technologies -- Frame relay -- Fiber-distributed data interface -- Asynchronous transfer mode -- TCP/IP Networking -- IP suite of protocols -- Secure Socket Layer -- Vpn -- The Internet -- Backbone (including MBONE) -- Internet service providers -- 4 Supervisory Control Applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Opc -- Sql -- Common Object Request Broker Architecture -- Dcom -- Iccp -- Uca2.0 -- 5 Operator Interface -- Access-Control Mechanisms -- Standard System Displays -- Diagnostic displays -- Site/Industry-Specific Displays -- Graphical displays -- Display hierarchy -- Pan and zoom -- Decluttering -- Layering -- Display navigation -- Alarms and indicators -- Alarm filtering -- Alarm annunciation -- Alarm history file -- Alarm-state visual indication -- Historical Trending -- Historical trending displays -- Real-time trending -- Logs and Reports -- Calculated values -- Statistical calculations -- Spreadsheet report generators -- Reports as data-exchange mechanism -- Section 2: Cybersecurity Principles, Processes, and Technologies -- 6 Conventional Information Technology Security -- Availability, Integrity, and Confidentiality -- Remote Access -- TCP/IP Suite -- IP addresses and gateways -- Firewalls -- Classes of attack messages -- Probing and exploring -- Overloading -- Malware delivery -- Wireless LANs -- Rogue APs -- Bluetooth and WiFi ad hoc networks -- Authentication and Validation -- Strong authentication -- Password strategies -- Encryption and Ciphers -- Shared secret -- Key size -- Hash code -- VPNs -- Intrusion Detection -- 7 Identifying CyberSecurity Vulnerabilities -- Threats and Threat Agents -- Internal threats -- External threats -- Targeted attacks -- Obvious Points of Attack and Vulnerability -- Most Frequently Used Means of Attack -- Probability of Attack -- Nonspecific attack probabilities -- Direct attack probabilities -- Guesstimating the Impact of a Successful Attack -- 8 Classifying Cyber Attacks and Cyber Threats -- Web Site/SQL Attacks -- E-mail Attacks -- Malware -- Software that mindlessly reproduces and consumes resources -- Software that inflicts harm once a programmer-specified trigger condition -- is met -- Software that allows a remote party to (re)enter your systems and (re)use -- your resources -- Software that finds and collects sensitive information -- Remote Control/Usage -- Zombie Recruitment -- 9 Physical Security -- Access Controls -- Manual access controls -- Electronic access controls -- Hybrid access controls -- Access Tracking -- Illegal-Entry Alarms -- Physical Isolation of Assets: Layers of Defense -- Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Fire suppression -- Telecommunications -- LANs -- Electric power -- Remote and Field Sites -- IP networking in the field -- 10 Operational Security -- Policies and Administrative Controls -- Procedures -- Procedural validation -- Critical procedure sets -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- 11 Electronic/Systems Security -- Removable Media -- Mobile Electronics -- Bluetooth -- Computer Systems -- PCs -- RTUs -- Section 3: Industrial Sectors -- 12 Electric Utility Industry-Specific Cybersecurity Issues -- Substation Back Doors -- IP to the Substation -- TASE.2/ICCP Connections -- Uca2 (Iec 61850) -- Dnp3.0 -- NERC 1200/1300 Compliance -- 13 Water/Wastewater Industry-Specific Cybersecurity Issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- IP to the Field -- 14 Pipeline Industry-Specific Cybersecurity Issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and E-mail Integration -- Section 4: SCADA Security Architectures -- 15 The Emerging Cyber Threat to SCADA Systems -- 16 Commercial Hardware and Software Vulnerabilities -- Operating System -- Tcp/Ip -- Web Site/Server -- Relational Databases -- Opc -- Dcom -- X-Window -- 17 Traditional Security Features of SCADA Systems -- User Access -- System Configuration -- Application Development -- System Physical Security -- Communications -- Interoperability -- 18 Eliminating the Vulnerabilities of Traditional SCADA Systems -- Technical Security Strategies -- The electronic perimeter -- Operational access -- System programs and supervisory applications -- Configuration data -- Intersystem and intrasystem data exchanges -- RTU communications -- Nontechnical Approaches -- Glossary -- Appendix A: The Department of Energy's "21 Steps to Improved SCADA -- Security" -- Appendix B: NERC 1300 Recommendations for Electric Utilities -- Appendix C: Security Recommendations of the Instruments, Systems, and -- Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D: Industry and Government Security Recommendations -- Appendix E: SCADA System Security Assessment Checklists -- Appendix F: Glossary -- Index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Supervisory control systems. 
650 0 |a Automatic data collection systems. 
650 0 |a Data protection. 
650 0 |a Computer security. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
776 0 8 |i Print version:  |a Shaw, William T.  |t Cybersecurity for SCADA systems.  |d Tulsa, Okla. : PennWell Corp., ©2006  |z 1593700687  |w (DLC) 2006013261  |w (OCoLC)67921946 
830 0 |a Knovel Library. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpCSCADAS2/cybersecurity-for-scada?kpromoter=marc  |y Full text