Table of Contents

Cover image

Title page

Copyright

Lead Author

Contributors

Foreword Contributor

Foreword Contributor

Foreword

Chapter 1. Physical Security: SCADA and the Critical Infrastructure’s Biggest Vulnerability

Introduction

Summary

Solutions Fast Track

Frequently Asked Questions (and Special Interviews)

Chapter 2. Supervisory Control and Data Acquisition

Introduction

Just What Is SCADA?

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 3. SCADA Security Assessment Methodology

Introduction

Why Do Assessments on SCADA Systems?

Information Protection Requirements

An Approach to SCADA Information Security Assessments

Pre-Project Activities

Pre-Assessment Activities

On-Site Assessment Activities

Post Assessment Activities

Resources

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 4. Developing an Effective Security Awareness Program

Introduction

Why an Information Security Awareness Program Is Important

How to Design an Effective Information Security Awareness Program

How to Implement an Information Security Awareness Program

How Do You Keep Your Program a Successful Component of Your Company’s Mindset?

How to Measure Your Program

Summary

Solutions Fast Track

Chapter 5. Working with Law Enforcement on SCADA Incidents

Introduction

SCADA System Overview

Secure Network Management

Managing Security Events

Examples of Common Attack Techniques

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 6. Locked but Not Secure: An Overview of Conventional and High Security Locks

Introduction

Conventional Pin Tumbler Locks

Standards for Conventional and High Security Locks

The Concept of Security

Security Vulnerabilities of Conventional Locks: Why High Security Locks Are Supposed to Offer More Protection Against Methods of Entry

Covert Entry Techniques: Manipulation of Internal Locking Components

High Security to High Insecurity: Real World Attacks

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 7. Bomb Threat Planning: Things Have Changed

Introduction

The Day Our World Changed

Insider Information: Where Do These Guys Get This Stuff?

The Terrorist Profile

Potential Terror Targets

What Should I Be Looking For?

Searching: What Am I Looking For and Where?

Evacuation Plans

Summary

Chapter 8. Biometric Authentication for SCADA Security

Introduction

Understanding Biometric Systems and How They Are Best Used for SCADA Security

Choosing the Best Form of Measurement for Your System

Where are Biometric Authentication Regimes Vulnerable?

Anticipating Legal and Policy Changes That Will Affect Biometrics

Summary

Solutions Fast Track

Frequently Asked Questions

Appendix. Personal, Workforce, and Family Preparedness

Introduction

Threats

Your Personal Preparedness Plan

The Escape Pack

Workforce Preparedness

Steps for Successful Workforce Preparedness

Get Out, Get Away, and Get in Touch

Family Preparedness Plan

Preparedness Pantry

Water

Cooking

Testing Your Home Preparedness Plan

Family Ready Kit

No Lights? No Problem!

Emergency Power

Staying in Touch

Summary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset