Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS (Hardcover)
暫譯: 工業控制系統的網路安全:SCADA、DCS、PLC、HMI 與 SIS (精裝版)

Tyson Macaulay, Bryan L. Singer

買這商品的人也買了...

相關主題

商品描述

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

 

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.

Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.

The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

商品描述(中文翻譯)

隨著工業控制系統(ICS),包括 SCADA、DCS 和其他過程控制網路,變得面向互聯網,它們暴露了關鍵服務於攻擊之下。像 Duqu 這樣的威脅,這是一種在野外發現的複雜蠕蟲,似乎與 Stuxnet 蠕蟲共享部分代碼,出現的頻率越來越高。

本書《工業控制系統的網路安全:SCADA、DCS、PLC、HMI 和 SIS》解釋了如何開發和實施有效的 ICS 網路安全計劃,為您提供確保網路安全的工具,而不犧牲 ICS 的效率和功能。

本書強調需要解決的關鍵問題,首先對 ICS 進行了徹底的介紹。它討論了商業、成本、競爭和監管驅動因素以及融合的相互矛盾的優先事項。接下來,它解釋了為什麼安全要求在 IT 和 ICS 之間有所不同。它區分了何時可以使用標準 IT 安全解決方案,以及何時需要 SCADA 特定的實踐。

本書檢視了 ICS 面臨的各種潛在威脅,包括劫持惡意軟體、僵屍網路、垃圾郵件引擎和色情撥號器。它概述了 ICS 在追求效率和功能過程中固有的各種脆弱性,這些脆弱性需要風險行為,例如對關鍵設備的遠端訪問和控制。通過回顧風險評估技術和不斷演變的風險評估過程,文本最後檢視了 ICS 安全的未來,包括 IPv6、ICSv6 測試實驗室設計以及 IPv6 和 ICS 感測器。