Cyber-security of SCADA and Other Industrial Control Systems

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber-security of SCADA and Other Industrial Control Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319321257
Publisher: Springer International Publishing Publication: August 23, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319321257
Publisher: Springer International Publishing
Publication: August 23, 2016
Imprint: Springer
Language: English

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?

This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?

This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

More books from Springer International Publishing

Cover of the book Designing Immersive Video Games Using 3DUI Technologies by
Cover of the book A Clinician's Guide to Integrative Oncology by
Cover of the book Optimal Search for Moving Targets by
Cover of the book Islamophobia and Securitization by
Cover of the book Model-Implementation Fidelity in Cyber Physical System Design by
Cover of the book Medicalizing Counselling by
Cover of the book Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems by
Cover of the book Emigration and Diaspora Policies in the Age of Mobility by
Cover of the book Lie Groups, Lie Algebras, and Representations by
Cover of the book Non-minimal Higgs Inflation and Frame Dependence in Cosmology by
Cover of the book Social Informatics by
Cover of the book Recent Advances in Learning Automata by
Cover of the book Quantifying Interactions of Biomolecules with Inorganic Surfaces by
Cover of the book Augmented Reality and Virtual Reality by
Cover of the book Geospatial Algebraic Computations by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy