Cargando…

Cybersecurity for SCADA Systems

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shaw, William T. (William Tim)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: OnixTransformation.OnixModel.CityOfPublication : PennWell Books, 2021.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1236264604
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 210206s2021 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d NTE  |d OCLCA  |d REDDC  |d OCLCF  |d OCLCO  |d OCLCL 
020 |a 9781593705053 
020 |a 1593705050 
035 |a (OCoLC)1236264604 
050 4 |a TJ222  |b .S539 2020 
082 0 4 |a 620.46028558  |2 23 
049 |a UAMI 
100 1 |a Shaw, William T.  |q (William Tim) 
245 1 0 |a Cybersecurity for SCADA Systems  |h [electronic resource]. 
260 |a OnixTransformation.OnixModel.CityOfPublication :  |b PennWell Books,  |c 2021. 
300 |a 1 online resource (523 p.) 
500 |a Description based upon print version of record. 
505 0 |a Intro -- Contents -- Preface -- Acknowledgements -- Introduction: Industrial Automation in the Aftermath of 9/11 -- Chapter 1. The technological evolution of scada systems -- The Early History of SCADA -- Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergence -- Ubiquitous Internet and IP Networking -- Generalized Software Architecture -- Chapter 2. Remote terminal units -- Basic Features and Functions -- Smart RTU Technology -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs 
505 8 |a Legacy Protocols -- Protocol Standards -- IP-Ready RTUs and Protocols -- Chapter 3. Telecommunications technologies -- Voice-Grade (Analog) Telephony -- Commercial Voice/Data Carriers -- Options for Wireless Communications -- Digital Networking Technologies -- TCP/IP Networking. -- The Internet -- Chapter 4. Supervisory control applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Chapter 5. Operator interface -- Access-Control Mechanisms -- Standard System Displays -- Site/Industry-Specific Displays -- Historical Trending 
505 8 |a Logs and Reports -- Chapter 6. Conventional information technology -- Availability, Integrity, and Confidentiality -- Remote Access/ Connectivity -- TCP/IP Suite -- Firewalls & Routers -- Wireless LANs -- Authentication and Validation -- Encryption and Ciphers -- Chapter 7. Identifying cybersecurity vulnerabilities -- Threats and Threat Agents -- Obvious Points of Attack and Vulnerability -- Chapter 8. Malware, cyberattacks and hacking tools -- Vulnerabilities -- WEB Server/SQL Injection -- Email and Web browsing -- Malware -- Chapter 9. Physical security -- Access Controls -- Access tracking 
505 8 |a Illegal-entry Alarms -- Physical Isolation of Assets: Layers of Defense -- Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Remote and Field Sites -- Chapter 10. Operational security -- Policies and Administrative Controls -- Procedures -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- Chapter 11. Computer systems & Network security -- Chapter 12. Electric utility industry -- specific cybersecurity issues -- Substation Backdoors -- IP to the Substation -- TASE.2/ICCP Connections -- UCA2 (IEC61850) -- DNP3.0 
505 8 |a NERC 1200/1300 Compliance -- Chapter 13. Water/ Wastewater industry -- specific cybersecurity issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory and Local Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- Chapter 14. Pipeline industry -- specific cybersecurity issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and Email Integration -- Chapter 15. The cyberthreat to scada systems 
500 |a Chapter 16. Commercial product vulnerabilities. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Automatic data collection systems. 
650 0 |a Supervisory control systems. 
650 0 |a Data protection. 
650 6 |a Collecte automatique des données. 
650 6 |a Commande supervisée. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Automatic data collection systems  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Supervisory control systems  |2 fast 
758 |i has work:  |a Cybersecurity for SCADA systems (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFBGyfJxP6rXQy3VTpGwVK  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Shaw, William T.  |t Cybersecurity for SCADA Systems  |d OnixTransformation.OnixModel.CityOfPublication : PennWell Books,c2021 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6468131  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6468131 
994 |a 92  |b IZTAP