Book overview and key learning points
Chapter 2: About Industrial Networks
The use of terminology within this book
Common industrial security recommendations
Advanced industrial security recommendations
Common misperceptions about industrial network security
Chapter 3: Industrial Cyber Security History and Trends
Importance of securing industrial networks
The evolution of the cyber threat
Hacktivism, cyber crime, cyber terrorism, and cyber war
Chapter 4: Introduction to Industrial Control Systems and Operations
Chapter 5: Industrial Network Design and Architecture
Introduction to industrial networking
Chapter 6: Industrial Network Protocols
Overview of industrial network protocols
Advanced metering infrastructure and the smart grid
Industrial protocol simulators
Chapter 7: Hacking Industrial Control Systems
Examples of weaponized industrial cyber threats
Chapter 8: Risk and Vulnerability Assessments
Cyber security and risk management
Methodologies for assessing risk within industrial control systems
Risk Classification and Ranking
Chapter 9: Establishing Zones and Conduits
Security zones and conduits explained
Identifying and classifying security zones and conduits
Recommended security zone separation
Establishing security zones and conduits
Chapter 10: Implementing Security and Access Controls
Implementing network security controls
Implementing host security and access controls
Chapter 11: Exception, Anomaly, and Threat Detection
Chapter 12: Security Monitoring of Industrial Control Systems
Successfully monitoring security zones
Chapter 13: Standards and Regulations
Common standards and regulations
Mapping industrial network security to compliance
Industry best practices for conducting ICS assessments
Appendix A: Protocol Resources
Appendix B: Standards Organizations