Managing cybersecurity in the process industries
Saved in:
| Corporate Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hoboken, NJ :
Wiley,
2022.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781119861812 1119861810 9781119861782 |
| Physical Description | 1 online resource. |
Cover
Table of Contents:
- Front Matter
- Introduction, Background, and History of Cybersecurity. Purpose of this Book
- Types of Cyber-Attacks, Who Engages in Them and Why
- Types of Risk Receptors/Targets
- Threat Sources and Types of Attacks
- Who Could Create a Cyber Risk? Insider vs. Outsider Threats
- Case Histories
- Integrating Cybersecurity Management into the Process Safety Framework. General Model for Understanding Cybersecurity Risk
- Designing a Secure Industrial Automation and Control System
- Hazard Identification and Risk Analysis (HIRA)
- Manage the Risk
- Implementing a Holistic Approach to Safety and Cybersecurity
- Where Do We Go from Here?. What's Next? A Look at Future Development Opportunities
- Available Resources
- Excerpt from NIST Cybersecurity Framework
- Detailed Cybersecurity PHA and LOPA Example
- Example Cybersecurity Metrics
- Cybersecurity Sample Audit Question List
- Management System Review Examples
- References
- Index