Chapter 1. Physical Security: SCADA and the Critical Infrastructure’s Biggest Vulnerability
Frequently Asked Questions (and Special Interviews)
Chapter 2. Supervisory Control and Data Acquisition
Chapter 3. SCADA Security Assessment Methodology
Why Do Assessments on SCADA Systems?
Information Protection Requirements
An Approach to SCADA Information Security Assessments
Chapter 4. Developing an Effective Security Awareness Program
Why an Information Security Awareness Program Is Important
How to Design an Effective Information Security Awareness Program
How to Implement an Information Security Awareness Program
How Do You Keep Your Program a Successful Component of Your Company’s Mindset?
Chapter 5. Working with Law Enforcement on SCADA Incidents
Examples of Common Attack Techniques
Chapter 6. Locked but Not Secure: An Overview of Conventional and High Security Locks
Conventional Pin Tumbler Locks
Standards for Conventional and High Security Locks
Covert Entry Techniques: Manipulation of Internal Locking Components
High Security to High Insecurity: Real World Attacks
Chapter 7. Bomb Threat Planning: Things Have Changed
Insider Information: Where Do These Guys Get This Stuff?
Searching: What Am I Looking For and Where?
Chapter 8. Biometric Authentication for SCADA Security
Understanding Biometric Systems and How They Are Best Used for SCADA Security
Choosing the Best Form of Measurement for Your System
Where are Biometric Authentication Regimes Vulnerable?
Anticipating Legal and Policy Changes That Will Affect Biometrics
Appendix. Personal, Workforce, and Family Preparedness
Your Personal Preparedness Plan
Steps for Successful Workforce Preparedness
Get Out, Get Away, and Get in Touch