Cybersecurity for SCADA systems /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Tulsa, Okla. :
PennWell Corp.,
©2006.
|
Colección: | Knovel Library.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Machine derived contents note: Contents
- Preface
- Acknowledgments
- Introduction
- Industrial Automation in the Aftermath of 9/11
- Section 1: Introduction to SCADA Systems
- 1 The Technological Evolution of SCADA Systems
- Early History of SCADA-Mainframes
- Minicomputers and Microprocessors
- Central Architectures
- Distributed Architectures
- Client/Server Designs
- Technological Convergences
- Generalized Software Architecture
- 2 Remote Terminal Units
- Basic Features and Functions
- Analog inputs
- Analog outputs
- Status inputs
- Contact outputs
- Pulse inputs
- Pulse outputs
- Smart RTU Technologies
- Serial ports
- Local display
- Downloaded logic and parameters
- Regulatory and sequence control
- Low-power operation
- Accumulator freeze
- Global Positioning System time receivers
- Daylight savings time
- Transducer-less AC inputs
- Top-Down and Bottom-Up Configuration
- The Emergence of PLCs
- Legacy Protocols
- Protocol Standards
- Network versus serial protocols
- Encapsulated protocols
- IP-Ready RTUs and Protocols
- 3 Telecommunications Technologies
- Voice-Grade (Analog) Telephony
- Telephone technology
- Licensed radio
- Communications backup
- Private telephone systems
- Commercial Voice/Data Carriers
- X.25 packet switching networks
- The digital telephone company
- T1/T3 circuits
- Integrated service digital network
- Frame relay
- DSL technologies
- Options for Wireless Communications
- WiFi and WiMAX
- Cellular
- Digital Networking Technologies
- Frame relay
- Fiber-distributed data interface
- Asynchronous transfer mode
- TCP/IP Networking
- IP suite of protocols
- Secure Socket Layer
- Vpn
- The Internet
- Backbone (including MBONE)
- Internet service providers
- 4 Supervisory Control Applications
- Operating System Utilities
- SCADA System Utilities
- Program Development Tools
- Standardized APIs
- Opc
- Sql
- Common Object Request Broker Architecture
- Dcom
- Iccp
- Uca2.0
- 5 Operator Interface
- Access-Control Mechanisms
- Standard System Displays
- Diagnostic displays
- Site/Industry-Specific Displays
- Graphical displays
- Display hierarchy
- Pan and zoom
- Decluttering
- Layering
- Display navigation
- Alarms and indicators
- Alarm filtering
- Alarm annunciation
- Alarm history file
- Alarm-state visual indication
- Historical Trending
- Historical trending displays
- Real-time trending
- Logs and Reports
- Calculated values
- Statistical calculations
- Spreadsheet report generators
- Reports as data-exchange mechanism
- Section 2: Cybersecurity Principles, Processes, and Technologies
- 6 Conventional Information Technology Security
- Availability, Integrity, and Confidentiality
- Remote Access
- TCP/IP Suite
- IP addresses and gateways
- Firewalls
- Classes of attack messages
- Probing and exploring
- Overloading
- Malware delivery
- Wireless LANs
- Rogue APs
- Bluetooth and WiFi ad hoc networks
- Authentication and Validation
- Strong authentication
- Password strategies
- Encryption and Ciphers
- Shared secret
- Key size
- Hash code
- VPNs
- Intrusion Detection
- 7 Identifying CyberSecurity Vulnerabilities
- Threats and Threat Agents
- Internal threats
- External threats
- Targeted attacks
- Obvious Points of Attack and Vulnerability
- Most Frequently Used Means of Attack
- Probability of Attack
- Nonspecific attack probabilities
- Direct attack probabilities
- Guesstimating the Impact of a Successful Attack
- 8 Classifying Cyber Attacks and Cyber Threats
- Web Site/SQL Attacks
- E-mail Attacks
- Malware
- Software that mindlessly reproduces and consumes resources
- Software that inflicts harm once a programmer-specified trigger condition
- is met
- Software that allows a remote party to (re)enter your systems and (re)use
- your resources
- Software that finds and collects sensitive information
- Remote Control/Usage
- Zombie Recruitment
- 9 Physical Security
- Access Controls
- Manual access controls
- Electronic access controls
- Hybrid access controls
- Access Tracking
- Illegal-Entry Alarms
- Physical Isolation of Assets: Layers of Defense
- Physical Protection of Materials and Information
- Critical Ancillary Subsystems
- Fire suppression
- Telecommunications
- LANs
- Electric power
- Remote and Field Sites
- IP networking in the field
- 10 Operational Security
- Policies and Administrative Controls
- Procedures
- Procedural validation
- Critical procedure sets
- Operational Differences
- Training
- Recovery Procedures
- Annual Review
- Background Checks
- 11 Electronic/Systems Security
- Removable Media
- Mobile Electronics
- Bluetooth
- Computer Systems
- PCs
- RTUs
- Section 3: Industrial Sectors
- 12 Electric Utility Industry-Specific Cybersecurity Issues
- Substation Back Doors
- IP to the Substation
- TASE.2/ICCP Connections
- Uca2 (Iec 61850)
- Dnp3.0
- NERC 1200/1300 Compliance
- 13 Water/Wastewater Industry-Specific Cybersecurity Issues
- Licensed Radio Communications
- Nonsecure Protocols
- PLC Equipment as RTUs
- Supervisory Control Applications
- Municipal LANs and WANs
- Control Interfaces to Plant Control Systems
- IP to the Field
- 14 Pipeline Industry-Specific Cybersecurity Issues
- Radio Communications
- Smart RTUs
- RTU Program Logic
- Supervisory Control Applications
- IP along the Pipeline
- Web Browsing and E-mail Integration
- Section 4: SCADA Security Architectures
- 15 The Emerging Cyber Threat to SCADA Systems
- 16 Commercial Hardware and Software Vulnerabilities
- Operating System
- Tcp/Ip
- Web Site/Server
- Relational Databases
- Opc
- Dcom
- X-Window
- 17 Traditional Security Features of SCADA Systems
- User Access
- System Configuration
- Application Development
- System Physical Security
- Communications
- Interoperability
- 18 Eliminating the Vulnerabilities of Traditional SCADA Systems
- Technical Security Strategies
- The electronic perimeter
- Operational access
- System programs and supervisory applications
- Configuration data
- Intersystem and intrasystem data exchanges
- RTU communications
- Nontechnical Approaches
- Glossary
- Appendix A: The Department of Energy's "21 Steps to Improved SCADA
- Security"
- Appendix B: NERC 1300 Recommendations for Electric Utilities
- Appendix C: Security Recommendations of the Instruments, Systems, and
- Automation Society and the American Gas Association
- Recommendations of the AGA
- Appendix D: Industry and Government Security Recommendations
- Appendix E: SCADA System Security Assessment Checklists
- Appendix F: Glossary
- Index.