Description
As industrial Keep watch over systems (ICS), including SCADA, DCS, and other process Keep watch over networks, develop into Internet-facing, they expose the most important services and products to attack. Threats like Duqu, a sophisticated worm found in the wild that perceived to share portions of its code with the Stuxnet worm, emerge with increasing frequency.
Explaining how to develop and put into effect an effective cybersecurity program for ICS, Cybersecurity for Industrial Keep watch over Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to make sure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that want to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be utilized and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote get entry to and Keep watch over of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.