Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment
暫譯: 工業網路安全 - 第二版:有效監控您的工業控制系統環境的網路安全狀態

Ackerman, Pascal

  • 出版商: Packt Publishing
  • 出版日期: 2021-10-07
  • 售價: $2,260
  • 貴賓價: 9.5$2,147
  • 語言: 英文
  • 頁數: 800
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 1800202091
  • ISBN-13: 9781800202092
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

Get up and running with industrial cybersecurity monitoring with this hands-on book, and explore ICS cybersecurity monitoring tasks, activities, tools, and best practices

 

Key Features:

  • Architect, design, and build ICS networks with security in mind
  • Perform a variety of security assessments, checks, and verifications
  • Ensure that your security processes are effective, complete, and relevant

 

Book Description:

With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.

 

You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.

 

By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.

 

What You Will Learn:

  • Monitor the ICS security posture actively as well as passively
  • Respond to incidents in a controlled and standard way
  • Understand what incident response activities are required in your ICS environment
  • Perform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stack
  • Assess the overall effectiveness of your ICS cybersecurity program
  • Discover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environment

 

Who this book is for:

If you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.

商品描述(中文翻譯)

透過這本實作導向的書籍,快速上手工業網路安全監控,探索 ICS 網路安全監控任務、活動、工具及最佳實踐

主要特色:


  • 以安全為考量,架構、設計並建置 ICS 網路

  • 執行各種安全評估、檢查及驗證

  • 確保您的安全流程有效、完整且相關

書籍描述:

隨著工業控制系統(ICS)擴展至傳統 IT 空間甚至雲端,ICS 環境的攻擊面顯著增加,因此識別您的 ICS 漏洞並實施先進的監控和防禦技術以應對快速演變的關鍵基礎設施網路威脅變得至關重要。本書第二版涵蓋了更新的工業非軍事區(IDMZ)架構,並展示如何為您的 ICS 環境實施、驗證和監控全面的安全計畫。

您將首先學習如何設計以安全為導向的架構,使您能有效且輕鬆地實施本書所涵蓋的工具、技術和活動。您將掌握 ICS 網路安全風險的監控、追蹤和趨勢分析(可視化)程序,並了解 ICS 環境的整體安全計畫和狀態/衛生。接著,本書將介紹威脅獵捕的原則、工具和技術,幫助您成功識別惡意活動。最後,您將在 ICS 環境中使用事件響應和事件恢復的工具和技術。

在本書結束時,您將對工業網路安全監控、評估、事件響應活動以及威脅獵捕有扎實的理解。

您將學到的內容:


  • 主動及被動監控 ICS 的安全狀態

  • 以受控和標準的方式回應事件

  • 了解在您的 ICS 環境中需要哪些事件響應活動

  • 使用 Elasticsearch、Logstash 和 Kibana(ELK)堆疊執行威脅獵捕練習

  • 評估您的 ICS 網路安全計畫的整體有效性

  • 發現工具、技術、方法論和活動,以對您的 ICS 環境進行風險評估

本書適合誰閱讀:

如果您是 ICS 安全專業人士或對於擴展、改善、監控和驗證您的 ICS 網路安全狀態感到好奇的人,那麼這本書適合您。對於有興趣進入 ICS 網路安全監控領域的 IT/OT 專業人士,或尋找不同業界領先的網路安全認證的額外學習材料的人士,本書也將非常有用。