|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
KNOVEL_ocn743006497 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
110727s2006 okua o 001 0 eng d |
010 |
|
|
|a 2006013261
|
040 |
|
|
|a KNOVL
|b eng
|e pn
|c KNOVL
|d OCLCQ
|d DEBSZ
|d ZCU
|d OCLCQ
|d KNOVL
|d E7B
|d OCLCF
|d OCLCQ
|d STF
|d VT2
|d OCLCQ
|d OCLCA
|d BUF
|d REB
|d CEF
|d RRP
|d COO
|d AU@
|d WYU
|d OCLCO
|d OCLCQ
|d NTE
|d OCLCA
|
019 |
|
|
|a 646849523
|a 961883003
|a 988653754
|a 999408541
|a 1026426893
|a 1058075563
|a 1065647482
|
020 |
|
|
|a 9781615839773
|q (electronic bk.)
|
020 |
|
|
|a 1615839771
|q (electronic bk.)
|
020 |
|
|
|z 1593700687
|q (hardcover)
|
020 |
|
|
|z 9781593700683
|q (hardcover)
|
029 |
1 |
|
|a AU@
|b 000048592698
|
029 |
1 |
|
|a DEBSZ
|b 371512794
|
029 |
1 |
|
|a GBVCP
|b 871529327
|
029 |
1 |
|
|a NZ1
|b 14232218
|
029 |
1 |
|
|a NZ1
|b 15620421
|
035 |
|
|
|a (OCoLC)743006497
|z (OCoLC)646849523
|z (OCoLC)961883003
|z (OCoLC)988653754
|z (OCoLC)999408541
|z (OCoLC)1026426893
|z (OCoLC)1058075563
|z (OCoLC)1065647482
|
037 |
|
|
|b Knovel Corporation
|n http://www.knovel.com
|
050 |
|
4 |
|a TJ222
|b .S53 2006eb
|
082 |
0 |
4 |
|a 620/.46028558
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shaw, William T.
|q (William Tim)
|
245 |
1 |
0 |
|a Cybersecurity for SCADA systems /
|c William T. Shaw.
|
260 |
|
|
|a Tulsa, Okla. :
|b PennWell Corp.,
|c ©2006.
|
300 |
|
|
|a 1 online resource (xviii, 562 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|a Machine derived contents note: Contents -- Preface -- Acknowledgments -- Introduction -- Industrial Automation in the Aftermath of 9/11 -- Section 1: Introduction to SCADA Systems -- 1 The Technological Evolution of SCADA Systems -- Early History of SCADA-Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergences -- Generalized Software Architecture -- 2 Remote Terminal Units -- Basic Features and Functions -- Analog inputs -- Analog outputs -- Status inputs -- Contact outputs -- Pulse inputs -- Pulse outputs -- Smart RTU Technologies -- Serial ports -- Local display -- Downloaded logic and parameters -- Regulatory and sequence control -- Low-power operation -- Accumulator freeze -- Global Positioning System time receivers -- Daylight savings time -- Transducer-less AC inputs -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- Network versus serial protocols -- Encapsulated protocols -- IP-Ready RTUs and Protocols -- 3 Telecommunications Technologies -- Voice-Grade (Analog) Telephony -- Telephone technology -- Licensed radio -- Communications backup -- Private telephone systems -- Commercial Voice/Data Carriers -- X.25 packet switching networks -- The digital telephone company -- T1/T3 circuits -- Integrated service digital network -- Frame relay -- DSL technologies -- Options for Wireless Communications -- WiFi and WiMAX -- Cellular -- Digital Networking Technologies -- Frame relay -- Fiber-distributed data interface -- Asynchronous transfer mode -- TCP/IP Networking -- IP suite of protocols -- Secure Socket Layer -- Vpn -- The Internet -- Backbone (including MBONE) -- Internet service providers -- 4 Supervisory Control Applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Opc -- Sql -- Common Object Request Broker Architecture -- Dcom -- Iccp -- Uca2.0 -- 5 Operator Interface -- Access-Control Mechanisms -- Standard System Displays -- Diagnostic displays -- Site/Industry-Specific Displays -- Graphical displays -- Display hierarchy -- Pan and zoom -- Decluttering -- Layering -- Display navigation -- Alarms and indicators -- Alarm filtering -- Alarm annunciation -- Alarm history file -- Alarm-state visual indication -- Historical Trending -- Historical trending displays -- Real-time trending -- Logs and Reports -- Calculated values -- Statistical calculations -- Spreadsheet report generators -- Reports as data-exchange mechanism -- Section 2: Cybersecurity Principles, Processes, and Technologies -- 6 Conventional Information Technology Security -- Availability, Integrity, and Confidentiality -- Remote Access -- TCP/IP Suite -- IP addresses and gateways -- Firewalls -- Classes of attack messages -- Probing and exploring -- Overloading -- Malware delivery -- Wireless LANs -- Rogue APs -- Bluetooth and WiFi ad hoc networks -- Authentication and Validation -- Strong authentication -- Password strategies -- Encryption and Ciphers -- Shared secret -- Key size -- Hash code -- VPNs -- Intrusion Detection -- 7 Identifying CyberSecurity Vulnerabilities -- Threats and Threat Agents -- Internal threats -- External threats -- Targeted attacks -- Obvious Points of Attack and Vulnerability -- Most Frequently Used Means of Attack -- Probability of Attack -- Nonspecific attack probabilities -- Direct attack probabilities -- Guesstimating the Impact of a Successful Attack -- 8 Classifying Cyber Attacks and Cyber Threats -- Web Site/SQL Attacks -- E-mail Attacks -- Malware -- Software that mindlessly reproduces and consumes resources -- Software that inflicts harm once a programmer-specified trigger condition -- is met -- Software that allows a remote party to (re)enter your systems and (re)use -- your resources -- Software that finds and collects sensitive information -- Remote Control/Usage -- Zombie Recruitment -- 9 Physical Security -- Access Controls -- Manual access controls -- Electronic access controls -- Hybrid access controls -- Access Tracking -- Illegal-Entry Alarms -- Physical Isolation of Assets: Layers of Defense -- Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Fire suppression -- Telecommunications -- LANs -- Electric power -- Remote and Field Sites -- IP networking in the field -- 10 Operational Security -- Policies and Administrative Controls -- Procedures -- Procedural validation -- Critical procedure sets -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- 11 Electronic/Systems Security -- Removable Media -- Mobile Electronics -- Bluetooth -- Computer Systems -- PCs -- RTUs -- Section 3: Industrial Sectors -- 12 Electric Utility Industry-Specific Cybersecurity Issues -- Substation Back Doors -- IP to the Substation -- TASE.2/ICCP Connections -- Uca2 (Iec 61850) -- Dnp3.0 -- NERC 1200/1300 Compliance -- 13 Water/Wastewater Industry-Specific Cybersecurity Issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- IP to the Field -- 14 Pipeline Industry-Specific Cybersecurity Issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and E-mail Integration -- Section 4: SCADA Security Architectures -- 15 The Emerging Cyber Threat to SCADA Systems -- 16 Commercial Hardware and Software Vulnerabilities -- Operating System -- Tcp/Ip -- Web Site/Server -- Relational Databases -- Opc -- Dcom -- X-Window -- 17 Traditional Security Features of SCADA Systems -- User Access -- System Configuration -- Application Development -- System Physical Security -- Communications -- Interoperability -- 18 Eliminating the Vulnerabilities of Traditional SCADA Systems -- Technical Security Strategies -- The electronic perimeter -- Operational access -- System programs and supervisory applications -- Configuration data -- Intersystem and intrasystem data exchanges -- RTU communications -- Nontechnical Approaches -- Glossary -- Appendix A: The Department of Energy's "21 Steps to Improved SCADA -- Security" -- Appendix B: NERC 1300 Recommendations for Electric Utilities -- Appendix C: Security Recommendations of the Instruments, Systems, and -- Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D: Industry and Government Security Recommendations -- Appendix E: SCADA System Security Assessment Checklists -- Appendix F: Glossary -- Index.
|
546 |
|
|
|a English.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Process Design, Control & Automation
|
590 |
|
|
|a Knovel
|b ACADEMIC - Electrical & Power Engineering
|
650 |
|
0 |
|a Supervisory control systems.
|
650 |
|
0 |
|a Automatic data collection systems.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Commande supervisée.
|
650 |
|
6 |
|a Collecte automatique des données.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Automatic data collection systems.
|2 fast
|0 (OCoLC)fst00822733
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Supervisory control systems.
|2 fast
|0 (OCoLC)fst01139089
|
776 |
0 |
8 |
|i Print version:
|a Shaw, William T.
|t Cybersecurity for SCADA systems.
|d Tulsa, Okla. : PennWell Corp., ©2006
|z 1593700687
|w (DLC) 2006013261
|w (OCoLC)67921946
|
830 |
|
0 |
|a Knovel Library.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpCSCADAS2/toc
|z Texto completo
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10344622
|
994 |
|
|
|a 92
|b IZTAP
|