Cargando…

Cybersecurity for SCADA systems /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shaw, William T. (William Tim)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Tulsa, Okla. : PennWell Corp., ©2006.
Colección:Knovel Library.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 KNOVEL_ocn743006497
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cn|||||||||
008 110727s2006 okua o 001 0 eng d
010 |a  2006013261 
040 |a KNOVL  |b eng  |e pn  |c KNOVL  |d OCLCQ  |d DEBSZ  |d ZCU  |d OCLCQ  |d KNOVL  |d E7B  |d OCLCF  |d OCLCQ  |d STF  |d VT2  |d OCLCQ  |d OCLCA  |d BUF  |d REB  |d CEF  |d RRP  |d COO  |d AU@  |d WYU  |d OCLCO  |d OCLCQ  |d NTE  |d OCLCA 
019 |a 646849523  |a 961883003  |a 988653754  |a 999408541  |a 1026426893  |a 1058075563  |a 1065647482 
020 |a 9781615839773  |q (electronic bk.) 
020 |a 1615839771  |q (electronic bk.) 
020 |z 1593700687  |q (hardcover) 
020 |z 9781593700683  |q (hardcover) 
029 1 |a AU@  |b 000048592698 
029 1 |a DEBSZ  |b 371512794 
029 1 |a GBVCP  |b 871529327 
029 1 |a NZ1  |b 14232218 
029 1 |a NZ1  |b 15620421 
035 |a (OCoLC)743006497  |z (OCoLC)646849523  |z (OCoLC)961883003  |z (OCoLC)988653754  |z (OCoLC)999408541  |z (OCoLC)1026426893  |z (OCoLC)1058075563  |z (OCoLC)1065647482 
037 |b Knovel Corporation  |n http://www.knovel.com 
050 4 |a TJ222  |b .S53 2006eb 
082 0 4 |a 620/.46028558  |2 22 
049 |a UAMI 
100 1 |a Shaw, William T.  |q (William Tim) 
245 1 0 |a Cybersecurity for SCADA systems /  |c William T. Shaw. 
260 |a Tulsa, Okla. :  |b PennWell Corp.,  |c ©2006. 
300 |a 1 online resource (xviii, 562 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 0 |a Machine derived contents note: Contents -- Preface -- Acknowledgments -- Introduction -- Industrial Automation in the Aftermath of 9/11 -- Section 1: Introduction to SCADA Systems -- 1 The Technological Evolution of SCADA Systems -- Early History of SCADA-Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergences -- Generalized Software Architecture -- 2 Remote Terminal Units -- Basic Features and Functions -- Analog inputs -- Analog outputs -- Status inputs -- Contact outputs -- Pulse inputs -- Pulse outputs -- Smart RTU Technologies -- Serial ports -- Local display -- Downloaded logic and parameters -- Regulatory and sequence control -- Low-power operation -- Accumulator freeze -- Global Positioning System time receivers -- Daylight savings time -- Transducer-less AC inputs -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- Network versus serial protocols -- Encapsulated protocols -- IP-Ready RTUs and Protocols -- 3 Telecommunications Technologies -- Voice-Grade (Analog) Telephony -- Telephone technology -- Licensed radio -- Communications backup -- Private telephone systems -- Commercial Voice/Data Carriers -- X.25 packet switching networks -- The digital telephone company -- T1/T3 circuits -- Integrated service digital network -- Frame relay -- DSL technologies -- Options for Wireless Communications -- WiFi and WiMAX -- Cellular -- Digital Networking Technologies -- Frame relay -- Fiber-distributed data interface -- Asynchronous transfer mode -- TCP/IP Networking -- IP suite of protocols -- Secure Socket Layer -- Vpn -- The Internet -- Backbone (including MBONE) -- Internet service providers -- 4 Supervisory Control Applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Opc -- Sql -- Common Object Request Broker Architecture -- Dcom -- Iccp -- Uca2.0 -- 5 Operator Interface -- Access-Control Mechanisms -- Standard System Displays -- Diagnostic displays -- Site/Industry-Specific Displays -- Graphical displays -- Display hierarchy -- Pan and zoom -- Decluttering -- Layering -- Display navigation -- Alarms and indicators -- Alarm filtering -- Alarm annunciation -- Alarm history file -- Alarm-state visual indication -- Historical Trending -- Historical trending displays -- Real-time trending -- Logs and Reports -- Calculated values -- Statistical calculations -- Spreadsheet report generators -- Reports as data-exchange mechanism -- Section 2: Cybersecurity Principles, Processes, and Technologies -- 6 Conventional Information Technology Security -- Availability, Integrity, and Confidentiality -- Remote Access -- TCP/IP Suite -- IP addresses and gateways -- Firewalls -- Classes of attack messages -- Probing and exploring -- Overloading -- Malware delivery -- Wireless LANs -- Rogue APs -- Bluetooth and WiFi ad hoc networks -- Authentication and Validation -- Strong authentication -- Password strategies -- Encryption and Ciphers -- Shared secret -- Key size -- Hash code -- VPNs -- Intrusion Detection -- 7 Identifying CyberSecurity Vulnerabilities -- Threats and Threat Agents -- Internal threats -- External threats -- Targeted attacks -- Obvious Points of Attack and Vulnerability -- Most Frequently Used Means of Attack -- Probability of Attack -- Nonspecific attack probabilities -- Direct attack probabilities -- Guesstimating the Impact of a Successful Attack -- 8 Classifying Cyber Attacks and Cyber Threats -- Web Site/SQL Attacks -- E-mail Attacks -- Malware -- Software that mindlessly reproduces and consumes resources -- Software that inflicts harm once a programmer-specified trigger condition -- is met -- Software that allows a remote party to (re)enter your systems and (re)use -- your resources -- Software that finds and collects sensitive information -- Remote Control/Usage -- Zombie Recruitment -- 9 Physical Security -- Access Controls -- Manual access controls -- Electronic access controls -- Hybrid access controls -- Access Tracking -- Illegal-Entry Alarms -- Physical Isolation of Assets: Layers of Defense -- Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Fire suppression -- Telecommunications -- LANs -- Electric power -- Remote and Field Sites -- IP networking in the field -- 10 Operational Security -- Policies and Administrative Controls -- Procedures -- Procedural validation -- Critical procedure sets -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- 11 Electronic/Systems Security -- Removable Media -- Mobile Electronics -- Bluetooth -- Computer Systems -- PCs -- RTUs -- Section 3: Industrial Sectors -- 12 Electric Utility Industry-Specific Cybersecurity Issues -- Substation Back Doors -- IP to the Substation -- TASE.2/ICCP Connections -- Uca2 (Iec 61850) -- Dnp3.0 -- NERC 1200/1300 Compliance -- 13 Water/Wastewater Industry-Specific Cybersecurity Issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- IP to the Field -- 14 Pipeline Industry-Specific Cybersecurity Issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and E-mail Integration -- Section 4: SCADA Security Architectures -- 15 The Emerging Cyber Threat to SCADA Systems -- 16 Commercial Hardware and Software Vulnerabilities -- Operating System -- Tcp/Ip -- Web Site/Server -- Relational Databases -- Opc -- Dcom -- X-Window -- 17 Traditional Security Features of SCADA Systems -- User Access -- System Configuration -- Application Development -- System Physical Security -- Communications -- Interoperability -- 18 Eliminating the Vulnerabilities of Traditional SCADA Systems -- Technical Security Strategies -- The electronic perimeter -- Operational access -- System programs and supervisory applications -- Configuration data -- Intersystem and intrasystem data exchanges -- RTU communications -- Nontechnical Approaches -- Glossary -- Appendix A: The Department of Energy's "21 Steps to Improved SCADA -- Security" -- Appendix B: NERC 1300 Recommendations for Electric Utilities -- Appendix C: Security Recommendations of the Instruments, Systems, and -- Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D: Industry and Government Security Recommendations -- Appendix E: SCADA System Security Assessment Checklists -- Appendix F: Glossary -- Index. 
546 |a English. 
590 |a Knovel  |b ACADEMIC - Process Design, Control & Automation 
590 |a Knovel  |b ACADEMIC - Electrical & Power Engineering 
650 0 |a Supervisory control systems. 
650 0 |a Automatic data collection systems. 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Commande supervisée. 
650 6 |a Collecte automatique des données. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a Automatic data collection systems.  |2 fast  |0 (OCoLC)fst00822733 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Supervisory control systems.  |2 fast  |0 (OCoLC)fst01139089 
776 0 8 |i Print version:  |a Shaw, William T.  |t Cybersecurity for SCADA systems.  |d Tulsa, Okla. : PennWell Corp., ©2006  |z 1593700687  |w (DLC) 2006013261  |w (OCoLC)67921946 
830 0 |a Knovel Library. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpCSCADAS2/toc  |z Texto completo 
938 |a ebrary  |b EBRY  |n ebr10344622 
994 |a 92  |b IZTAP