Cargando…

Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems /

This book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. It provides a thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Knapp, Eric D. (Autor), Langill, Joel Thomas (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, [2015]
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Machine generated contents note: ch. 1 Introduction
  • Book Overview and Key Learning Points
  • Book Audience
  • Diagrams and Figures
  • The Smart Grid
  • How This Book is Organized
  • ch. 2 About Industrial Networks
  • ch. 3 Industrial Cyber Security, History, and Trends
  • ch. 4 Introduction to ICS and Operations
  • ch. 5 ICS Network Design and Architecture
  • ch. 6 Industrial Network Protocols
  • ch. 7 Hacking Industrial Systems
  • ch. 8 Risk and Vulnerability Assessments
  • ch. 9 Establishing Zones and Conduits
  • ch. 10 Implementing Security and Access Controls
  • ch. 11 Exception, Anomaly, and Threat Detection
  • ch. 12 Security Monitoring of Industrial Control Systems
  • ch. 13 Standards and Regulations
  • Changes Made to the Second Edition
  • Conclusion
  • ch. 2 About Industrial Networks
  • The Use of Terminology Within This Book
  • Attacks, Breaches, and Incidents: Malware, Exploits, and APTs
  • Assets, Critical Assets, Cyber Assets, and Critical Cyber Assets
  • Note continued: Security Controls and Security Countermeasures
  • Firewalls and Intrusion Prevention Systems
  • Industrial Control System
  • DCS or SCADA?
  • Industrial Networks
  • Industrial Protocols
  • Networks, Routable Networks, and Nonroutable Networks
  • Enterprise or Business Networks
  • Zones and Enclaves
  • Network Perimeters or "Electronic Security Perimeters"
  • Critical Infrastructure
  • Common Industrial Security Recommendations
  • Identification of Critical Systems
  • Network Segmentation/Isolation of Systems
  • Defense in Depth
  • Access Control
  • Advanced Industrial Security Recommendations
  • Security Monitoring
  • Policy Whitelisting
  • Application Whitelisting
  • Common Misperceptions About Industrial Network Security
  • Assumptions Made in This Book
  • Summary
  • Endnotes
  • ch. 3 Industrial Cyber Security History and Trends
  • Importance of Securing Industrial Networks
  • The Evolution of the Cyber Threat
  • APTs and Weaponized Malware
  • Note continued: Still to Come
  • Defending Against Modern Cyber Threats
  • Insider Threats
  • Hacktivism, Cyber Crime, Cyber Terrorism, and Cyber War
  • Summary
  • Endnotes
  • ch. 4 Introduction to Industrial Control Systems and Operations
  • System Assets
  • Programmable Logic Controller
  • Remote Terminal Unit
  • Intelligent Electronic Device
  • Human-Machine Interface
  • Supervisory Workstations
  • Data Historian
  • Business Information Consoles and Dashboards
  • Other Assets
  • System Operations
  • Control Loops
  • Control Processes
  • Feedback Loops
  • Production Information Management
  • Business Information Management
  • Process Management
  • Safety Instrumented Systems
  • The Smart Grid
  • Network Architectures
  • Summary
  • Endnotes
  • ch. 5 Industrial Network Design and Architecture
  • Introduction to Industrial Networking
  • Common Topologies
  • Network Segmentation
  • Higher Layer Segmentation
  • Physical vs. Logical Segmentation
  • Network Services
  • Note continued: Wireless Networks
  • Remote Access
  • Performance Considerations
  • Latency and Jitter
  • Bandwidth and Throughput
  • Type of Service, Class of Service, and Quality of Service
  • Network Hops
  • Network Security Controls
  • Safety Instrumented Systems
  • Special Considerations
  • Wide Area Connectivity
  • Smart Grid Network Considerations
  • Advanced Metering Infrastructure
  • Summary
  • Endnotes
  • ch. 6 Industrial Network Protocols
  • Overview of Industrial Network Protocols
  • Fieldbus Protocols
  • Modicon Communication Bus
  • Distributed Network Protocol
  • Process Fieldbus
  • Industrial Ethernet Protocols
  • Ethernet Industrial Protocol
  • PROFLNET
  • EtherCAT
  • Ethernet POWERLINK
  • SERCOS III
  • Backend Protocols
  • Open Process Communications
  • Inter-Control Center Communications Protocol
  • Advanced Metering Infrastructure and the Smart Grid
  • Security Concerns
  • Security Recommendations
  • Industrial Protocol Simulators
  • Modbus
  • Note continued: DNP3/IEC 60870-5
  • OPC
  • ICCP / IEC 60870-6 (TASE. 2)
  • Physical Hardware
  • Summary
  • Endnotes
  • ch. 7 Hacking Industrial Control Systems
  • Motives and Consequences
  • Consequences of a Successful Cyber Incident
  • Cyber Security and Safety
  • Common Industrial Targets
  • Common Attack Methods
  • Man-in-the-Middle Attacks
  • Denial-of-Service Attacks
  • Replay Attacks
  • Compromising the Human-Machine Interface
  • Compromising the Engineering Workstation
  • Blended Attacks
  • Examples of Weaponized Industrial Cyber Threats
  • Stuxnet
  • Shamoon/DistTrack
  • Flame/Flamer/Skywiper
  • Attack Trends
  • Evolving Vulnerabilities: The Adobe Exploits
  • Industrial Application Layer Attacks
  • Antisocial Networks: A New Playground for Malware
  • Dealing with an Infection
  • Summary
  • Endnotes
  • ch. 8 Risk and Vulnerability Assessments
  • Cyber Security and Risk Management
  • Why Risk Management is the Foundation of Cyber Security
  • What is Risk?
  • Note continued: Standards and Best Practices for Risk Management
  • Methodologies for Assessing Risk Within Industrial Control Systems
  • Security Tests
  • Establishing a Testing and Assessment Methodology
  • System Characterization
  • Data Collection
  • Scanning of Industrial Networks
  • Threat Identification
  • Threat Actors/Sources
  • Threat Vectors
  • Threat Events
  • Identification of Threats During Security Assessments
  • Vulnerability Identification
  • Vulnerability Scanning
  • Configuration Auditing
  • Vulnerability Prioritization
  • Risk Classification and Ranking
  • Consequences and Impact
  • How to Estimate Consequences and Likelihood
  • Risk Ranking
  • Risk Reduction and Mitigation
  • Summary
  • Endnotes
  • ch. 9 Establishing Zones and Conduits
  • Security Zones and Conduits Explained
  • Identifying and Classifying Security Zones and Conduits
  • Recommended Security Zone Separation
  • Network Connectivity
  • Control Loops
  • Supervisory Controls
  • Note continued: Plant Level Control Processes
  • Control Data Storage
  • Trading Communications
  • Remote Access
  • Users and Roles
  • Protocols
  • Criticality
  • Establishing Security Zones and Conduits
  • Summary
  • Endnotes
  • ch. 10 Implementing Security and Access Controls
  • Network Segmentation
  • Zones and Security Policy Development
  • Using Zones within Security Device Configurations
  • Implementing Network Security Controls
  • Selecting Network Security Devices
  • Implementing Network Security Devices
  • Implementing Host Security and Access Controls
  • Selecting Host Cyber Security Systems
  • External Controls
  • Patch Management
  • How Much Security is Enough?
  • Summary
  • Endnotes
  • ch. 11 Exception, Anomaly, and Threat Detection
  • Exception Reporting
  • Behavioral Anomaly Detection
  • Measuring Baselines
  • Anomaly Detection
  • Behavioral Whitelisting
  • User Whitelists
  • Asset Whitelists
  • Application Behavior Whitelists
  • Threat Detection
  • Note continued: Event Correlation
  • Correlating Between IT and OT Systems
  • Summary
  • Endnotes
  • ch. 12 Security Monitoring of Industrial Control Systems
  • Determining what to Monitor
  • Security Events
  • Assets
  • Configurations
  • Applications
  • Networks
  • User Identities and Authentication
  • Additional Context
  • Behavior
  • Successfully Monitoring Security Zones
  • Log Collection
  • Direct Monitoring
  • Inferred Monitoring
  • Information Collection and Management Tools
  • Monitoring Across Secure Boundaries
  • Information Management
  • Queries
  • Reports
  • Alerts
  • Incident Investigation and Response
  • Log Storage and Retention
  • Nonrepudiation
  • Data Retention/Storage
  • Data Availability
  • Summary
  • Endnotes
  • ch. 13 Standards and Regulations
  • Common Standards and Regulations
  • NERC CIP
  • CFATS
  • ISO/TEC 27002
  • NRC Regulation 5.71
  • NIST SP 800-82
  • ISA/IEC-62443
  • ISA 62443 Group 1 "General."
  • Note continued: ISA 62443 Group 2 "Policies and Procedures"
  • ISA 62443 Group 3 "System"
  • ISA 62443 Group 4 "Component"
  • Mapping Industrial Network Security to Compliance
  • Industry Best Practices for Conducting ICS Assessments
  • Department of Homeland Security (USA) / Centre for Protection of National Infrastructure (UK)
  • National Security Agency (USA)
  • American Petroleum Institute (USA) / National Petrochemical and Refiners Association (USA)
  • Institute for Security and Open Methodologies (Spain)
  • Common Criteria and FTPS Standards
  • Common Criteria
  • FIPS 140-2
  • Summary
  • Endnotes
  • Appendix A Protocol Resources
  • Modbus Organization
  • DNP3 Users Group
  • OPC Foundation
  • Common Industrial Protocol (CIP) / Open Device Vendor Association (ODVA)
  • PROFD3US & PROFINET International (PI)
  • Appendix B Standards Organizations
  • North American Reliability Corporation (NERC)
  • The United States Nuclear Regulatory
  • Commission (NRC)
  • Note continued: NRC Title 10 CFR 73.54
  • NRC RG 5.71
  • United States Department of Homeland Security
  • Chemical Facilities Anti-Terrorism Standard (CFATS)
  • CFATS Risk-Based Performance Standards (RBPS)
  • International Society of Automation (ISA)
  • International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC)
  • Appendix C NIST Security Guidelines
  • National Institute of Standards and Technology, Special Publications 800 Series
  • Glossary
  • Endnotes.