Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Joel Thomas Langill, Eric D. Knapp
Industrial Network Security, 2nd Edition
Cover
Title page
Table of Contents
Copyright
About the Authors
Preface
Acknowledgments
Chapter 1: Introduction
Book overview and key learning points
Book audience
Diagrams and figures
The smart grid
How this book is organized
Conclusion
Chapter 2: About Industrial Networks
Abstract
The use of terminology within this book
Common industrial security recommendations
Advanced industrial security recommendations
Common misperceptions about industrial network security
Summary
Chapter 3: Industrial Cyber Security History and Trends
Abstract
Importance of securing industrial networks
The evolution of the cyber threat
Insider threats
Hacktivism, cyber crime, cyber terrorism, and cyber war
Summary
Chapter 4: Introduction to Industrial Control Systems and Operations
Abstract
System assets
System operations
Process management
Safety instrumented systems
The smart grid
Network architectures
Summary
Chapter 5: Industrial Network Design and Architecture
Abstract
Introduction to industrial networking
Common topologies
Network segmentation
Network services
Wireless networks
Remote access
Performance considerations
Safety instrumented systems
Special considerations
Summary
Chapter 6: Industrial Network Protocols
Abstract
Overview of industrial network protocols
Fieldbus protocols
Backend protocols
Advanced metering infrastructure and the smart grid
Industrial protocol simulators
Summary
Chapter 7: Hacking Industrial Control Systems
Abstract
Motives and consequences
Common industrial targets
Common attack methods
Examples of weaponized industrial cyber threats
Attack trends
Dealing with an infection
Summary
Chapter 8: Risk and Vulnerability Assessments
Abstract
Cyber security and risk management
Methodologies for assessing risk within industrial control systems
System characterization
Threat identification
Vulnerability identification
Risk Classification and Ranking
Risk reduction and mitigation
Summary
Chapter 9: Establishing Zones and Conduits
Abstract
Security zones and conduits explained
Identifying and classifying security zones and conduits
Recommended security zone separation
Establishing security zones and conduits
Summary
Chapter 10: Implementing Security and Access Controls
Abstract
Network segmentation
Implementing network security controls
Implementing host security and access controls
How much security is enough?
Summary
Chapter 11: Exception, Anomaly, and Threat Detection
Abstract
Exception Reporting
Behavioral anomaly detection
Behavioral Whitelisting
Threat Detection
Summary
Chapter 12: Security Monitoring of Industrial Control Systems
Abstract
Determining what to monitor
Successfully monitoring security zones
Information management
Log storage and retention
Summary
Chapter 13: Standards and Regulations
Abstract
Common standards and regulations
ISA/IEC-62443
Mapping industrial network security to compliance
Industry best practices for conducting ICS assessments
Common Criteria and FIPS Standards
Summary
Appendix A: Protocol Resources
Appendix B: Standards Organizations
Appendix C: NIST Security Guidelines
Glossary
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset