Cybersecurity for SCADA systems
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Tulsa, Okla. :
PennWell Corp.,
©2006.
|
Series: | Knovel Library.
|
Subjects: | |
ISBN: | 9781615839773 1615839771 1593700687 9781593700683 |
Physical Description: | 1 online resource (xviii, 562 pages) : illustrations |
LEADER | 08659cam a2200397 a 4500 | ||
---|---|---|---|
001 | kn-ocn743006497 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 110727s2006 okua o 001 0 eng d | ||
040 | |a KNOVL |b eng |e pn |c KNOVL |d OCLCQ |d DEBSZ |d ZCU |d OCLCQ |d KNOVL |d E7B |d OCLCF |d OCLCQ |d STF |d VT2 |d OCLCQ |d OCLCA |d BUF |d REB |d CEF |d RRP |d COO |d AU@ |d WYU |d OCLCO |d OCLCQ |d NTE |d OCLCA |d OCLCO |d OCLCQ |d OCLCL |d SXB | ||
020 | |a 9781615839773 |q (electronic bk.) | ||
020 | |a 1615839771 |q (electronic bk.) | ||
020 | |z 1593700687 |q (hardcover) | ||
020 | |z 9781593700683 |q (hardcover) | ||
035 | |a (OCoLC)743006497 |z (OCoLC)646849523 |z (OCoLC)961883003 |z (OCoLC)988653754 |z (OCoLC)999408541 |z (OCoLC)1026426893 |z (OCoLC)1058075563 |z (OCoLC)1065647482 | ||
100 | 1 | |a Shaw, William T. |q (William Tim) | |
245 | 1 | 0 | |a Cybersecurity for SCADA systems / |c William T. Shaw. |
260 | |a Tulsa, Okla. : |b PennWell Corp., |c ©2006. | ||
300 | |a 1 online resource (xviii, 562 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | 0 | |a Machine derived contents note: Contents -- Preface -- Acknowledgments -- Introduction -- Industrial Automation in the Aftermath of 9/11 -- Section 1: Introduction to SCADA Systems -- 1 The Technological Evolution of SCADA Systems -- Early History of SCADA-Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergences -- Generalized Software Architecture -- 2 Remote Terminal Units -- Basic Features and Functions -- Analog inputs -- Analog outputs -- Status inputs -- Contact outputs -- Pulse inputs -- Pulse outputs -- Smart RTU Technologies -- Serial ports -- Local display -- Downloaded logic and parameters -- Regulatory and sequence control -- Low-power operation -- Accumulator freeze -- Global Positioning System time receivers -- Daylight savings time -- Transducer-less AC inputs -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- Network versus serial protocols -- Encapsulated protocols -- IP-Ready RTUs and Protocols -- 3 Telecommunications Technologies -- Voice-Grade (Analog) Telephony -- Telephone technology -- Licensed radio -- Communications backup -- Private telephone systems -- Commercial Voice/Data Carriers -- X.25 packet switching networks -- The digital telephone company -- T1/T3 circuits -- Integrated service digital network -- Frame relay -- DSL technologies -- Options for Wireless Communications -- WiFi and WiMAX -- Cellular -- Digital Networking Technologies -- Frame relay -- Fiber-distributed data interface -- Asynchronous transfer mode -- TCP/IP Networking -- IP suite of protocols -- Secure Socket Layer -- Vpn -- The Internet -- Backbone (including MBONE) -- Internet service providers -- 4 Supervisory Control Applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Opc -- Sql -- Common Object Request Broker Architecture -- Dcom -- Iccp -- Uca2.0 -- 5 Operator Interface -- Access-Control Mechanisms -- Standard System Displays -- Diagnostic displays -- Site/Industry-Specific Displays -- Graphical displays -- Display hierarchy -- Pan and zoom -- Decluttering -- Layering -- Display navigation -- Alarms and indicators -- Alarm filtering -- Alarm annunciation -- Alarm history file -- Alarm-state visual indication -- Historical Trending -- Historical trending displays -- Real-time trending -- Logs and Reports -- Calculated values -- Statistical calculations -- Spreadsheet report generators -- Reports as data-exchange mechanism -- Section 2: Cybersecurity Principles, Processes, and Technologies -- 6 Conventional Information Technology Security -- Availability, Integrity, and Confidentiality -- Remote Access -- TCP/IP Suite -- IP addresses and gateways -- Firewalls -- Classes of attack messages -- Probing and exploring -- Overloading -- Malware delivery -- Wireless LANs -- Rogue APs -- Bluetooth and WiFi ad hoc networks -- Authentication and Validation -- Strong authentication -- Password strategies -- Encryption and Ciphers -- Shared secret -- Key size -- Hash code -- VPNs -- Intrusion Detection -- 7 Identifying CyberSecurity Vulnerabilities -- Threats and Threat Agents -- Internal threats -- External threats -- Targeted attacks -- Obvious Points of Attack and Vulnerability -- Most Frequently Used Means of Attack -- Probability of Attack -- Nonspecific attack probabilities -- Direct attack probabilities -- Guesstimating the Impact of a Successful Attack -- 8 Classifying Cyber Attacks and Cyber Threats -- Web Site/SQL Attacks -- E-mail Attacks -- Malware -- Software that mindlessly reproduces and consumes resources -- Software that inflicts harm once a programmer-specified trigger condition -- is met -- Software that allows a remote party to (re)enter your systems and (re)use -- your resources -- Software that finds and collects sensitive information -- Remote Control/Usage -- Zombie Recruitment -- 9 Physical Security -- Access Controls -- Manual access controls -- Electronic access controls -- Hybrid access controls -- Access Tracking -- Illegal-Entry Alarms -- Physical Isolation of Assets: Layers of Defense -- Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Fire suppression -- Telecommunications -- LANs -- Electric power -- Remote and Field Sites -- IP networking in the field -- 10 Operational Security -- Policies and Administrative Controls -- Procedures -- Procedural validation -- Critical procedure sets -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- 11 Electronic/Systems Security -- Removable Media -- Mobile Electronics -- Bluetooth -- Computer Systems -- PCs -- RTUs -- Section 3: Industrial Sectors -- 12 Electric Utility Industry-Specific Cybersecurity Issues -- Substation Back Doors -- IP to the Substation -- TASE.2/ICCP Connections -- Uca2 (Iec 61850) -- Dnp3.0 -- NERC 1200/1300 Compliance -- 13 Water/Wastewater Industry-Specific Cybersecurity Issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- IP to the Field -- 14 Pipeline Industry-Specific Cybersecurity Issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and E-mail Integration -- Section 4: SCADA Security Architectures -- 15 The Emerging Cyber Threat to SCADA Systems -- 16 Commercial Hardware and Software Vulnerabilities -- Operating System -- Tcp/Ip -- Web Site/Server -- Relational Databases -- Opc -- Dcom -- X-Window -- 17 Traditional Security Features of SCADA Systems -- User Access -- System Configuration -- Application Development -- System Physical Security -- Communications -- Interoperability -- 18 Eliminating the Vulnerabilities of Traditional SCADA Systems -- Technical Security Strategies -- The electronic perimeter -- Operational access -- System programs and supervisory applications -- Configuration data -- Intersystem and intrasystem data exchanges -- RTU communications -- Nontechnical Approaches -- Glossary -- Appendix A: The Department of Energy's "21 Steps to Improved SCADA -- Security" -- Appendix B: NERC 1300 Recommendations for Electric Utilities -- Appendix C: Security Recommendations of the Instruments, Systems, and -- Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D: Industry and Government Security Recommendations -- Appendix E: SCADA System Security Assessment Checklists -- Appendix F: Glossary -- Index. |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Supervisory control systems. | |
650 | 0 | |a Automatic data collection systems. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Computer security. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
776 | 0 | 8 | |i Print version: |a Shaw, William T. |t Cybersecurity for SCADA systems. |d Tulsa, Okla. : PennWell Corp., ©2006 |z 1593700687 |w (DLC) 2006013261 |w (OCoLC)67921946 |
830 | 0 | |a Knovel Library. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpCSCADAS2/cybersecurity-for-scada?kpromoter=marc |y Full text |