Cargando…

Cybersecurity for SCADA systems /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shaw, William T. (William Tim)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Tulsa, Okla. : PennWell Corp., ©2006.
Colección:Knovel Library.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Machine derived contents note: Contents
  • Preface
  • Acknowledgments
  • Introduction
  • Industrial Automation in the Aftermath of 9/11
  • Section 1: Introduction to SCADA Systems
  • 1 The Technological Evolution of SCADA Systems
  • Early History of SCADA-Mainframes
  • Minicomputers and Microprocessors
  • Central Architectures
  • Distributed Architectures
  • Client/Server Designs
  • Technological Convergences
  • Generalized Software Architecture
  • 2 Remote Terminal Units
  • Basic Features and Functions
  • Analog inputs
  • Analog outputs
  • Status inputs
  • Contact outputs
  • Pulse inputs
  • Pulse outputs
  • Smart RTU Technologies
  • Serial ports
  • Local display
  • Downloaded logic and parameters
  • Regulatory and sequence control
  • Low-power operation
  • Accumulator freeze
  • Global Positioning System time receivers
  • Daylight savings time
  • Transducer-less AC inputs
  • Top-Down and Bottom-Up Configuration
  • The Emergence of PLCs
  • Legacy Protocols
  • Protocol Standards
  • Network versus serial protocols
  • Encapsulated protocols
  • IP-Ready RTUs and Protocols
  • 3 Telecommunications Technologies
  • Voice-Grade (Analog) Telephony
  • Telephone technology
  • Licensed radio
  • Communications backup
  • Private telephone systems
  • Commercial Voice/Data Carriers
  • X.25 packet switching networks
  • The digital telephone company
  • T1/T3 circuits
  • Integrated service digital network
  • Frame relay
  • DSL technologies
  • Options for Wireless Communications
  • WiFi and WiMAX
  • Cellular
  • Digital Networking Technologies
  • Frame relay
  • Fiber-distributed data interface
  • Asynchronous transfer mode
  • TCP/IP Networking
  • IP suite of protocols
  • Secure Socket Layer
  • Vpn
  • The Internet
  • Backbone (including MBONE)
  • Internet service providers
  • 4 Supervisory Control Applications
  • Operating System Utilities
  • SCADA System Utilities
  • Program Development Tools
  • Standardized APIs
  • Opc
  • Sql
  • Common Object Request Broker Architecture
  • Dcom
  • Iccp
  • Uca2.0
  • 5 Operator Interface
  • Access-Control Mechanisms
  • Standard System Displays
  • Diagnostic displays
  • Site/Industry-Specific Displays
  • Graphical displays
  • Display hierarchy
  • Pan and zoom
  • Decluttering
  • Layering
  • Display navigation
  • Alarms and indicators
  • Alarm filtering
  • Alarm annunciation
  • Alarm history file
  • Alarm-state visual indication
  • Historical Trending
  • Historical trending displays
  • Real-time trending
  • Logs and Reports
  • Calculated values
  • Statistical calculations
  • Spreadsheet report generators
  • Reports as data-exchange mechanism
  • Section 2: Cybersecurity Principles, Processes, and Technologies
  • 6 Conventional Information Technology Security
  • Availability, Integrity, and Confidentiality
  • Remote Access
  • TCP/IP Suite
  • IP addresses and gateways
  • Firewalls
  • Classes of attack messages
  • Probing and exploring
  • Overloading
  • Malware delivery
  • Wireless LANs
  • Rogue APs
  • Bluetooth and WiFi ad hoc networks
  • Authentication and Validation
  • Strong authentication
  • Password strategies
  • Encryption and Ciphers
  • Shared secret
  • Key size
  • Hash code
  • VPNs
  • Intrusion Detection
  • 7 Identifying CyberSecurity Vulnerabilities
  • Threats and Threat Agents
  • Internal threats
  • External threats
  • Targeted attacks
  • Obvious Points of Attack and Vulnerability
  • Most Frequently Used Means of Attack
  • Probability of Attack
  • Nonspecific attack probabilities
  • Direct attack probabilities
  • Guesstimating the Impact of a Successful Attack
  • 8 Classifying Cyber Attacks and Cyber Threats
  • Web Site/SQL Attacks
  • E-mail Attacks
  • Malware
  • Software that mindlessly reproduces and consumes resources
  • Software that inflicts harm once a programmer-specified trigger condition
  • is met
  • Software that allows a remote party to (re)enter your systems and (re)use
  • your resources
  • Software that finds and collects sensitive information
  • Remote Control/Usage
  • Zombie Recruitment
  • 9 Physical Security
  • Access Controls
  • Manual access controls
  • Electronic access controls
  • Hybrid access controls
  • Access Tracking
  • Illegal-Entry Alarms
  • Physical Isolation of Assets: Layers of Defense
  • Physical Protection of Materials and Information
  • Critical Ancillary Subsystems
  • Fire suppression
  • Telecommunications
  • LANs
  • Electric power
  • Remote and Field Sites
  • IP networking in the field
  • 10 Operational Security
  • Policies and Administrative Controls
  • Procedures
  • Procedural validation
  • Critical procedure sets
  • Operational Differences
  • Training
  • Recovery Procedures
  • Annual Review
  • Background Checks
  • 11 Electronic/Systems Security
  • Removable Media
  • Mobile Electronics
  • Bluetooth
  • Computer Systems
  • PCs
  • RTUs
  • Section 3: Industrial Sectors
  • 12 Electric Utility Industry-Specific Cybersecurity Issues
  • Substation Back Doors
  • IP to the Substation
  • TASE.2/ICCP Connections
  • Uca2 (Iec 61850)
  • Dnp3.0
  • NERC 1200/1300 Compliance
  • 13 Water/Wastewater Industry-Specific Cybersecurity Issues
  • Licensed Radio Communications
  • Nonsecure Protocols
  • PLC Equipment as RTUs
  • Supervisory Control Applications
  • Municipal LANs and WANs
  • Control Interfaces to Plant Control Systems
  • IP to the Field
  • 14 Pipeline Industry-Specific Cybersecurity Issues
  • Radio Communications
  • Smart RTUs
  • RTU Program Logic
  • Supervisory Control Applications
  • IP along the Pipeline
  • Web Browsing and E-mail Integration
  • Section 4: SCADA Security Architectures
  • 15 The Emerging Cyber Threat to SCADA Systems
  • 16 Commercial Hardware and Software Vulnerabilities
  • Operating System
  • Tcp/Ip
  • Web Site/Server
  • Relational Databases
  • Opc
  • Dcom
  • X-Window
  • 17 Traditional Security Features of SCADA Systems
  • User Access
  • System Configuration
  • Application Development
  • System Physical Security
  • Communications
  • Interoperability
  • 18 Eliminating the Vulnerabilities of Traditional SCADA Systems
  • Technical Security Strategies
  • The electronic perimeter
  • Operational access
  • System programs and supervisory applications
  • Configuration data
  • Intersystem and intrasystem data exchanges
  • RTU communications
  • Nontechnical Approaches
  • Glossary
  • Appendix A: The Department of Energy's "21 Steps to Improved SCADA
  • Security"
  • Appendix B: NERC 1300 Recommendations for Electric Utilities
  • Appendix C: Security Recommendations of the Instruments, Systems, and
  • Automation Society and the American Gas Association
  • Recommendations of the AGA
  • Appendix D: Industry and Government Security Recommendations
  • Appendix E: SCADA System Security Assessment Checklists
  • Appendix F: Glossary
  • Index.