Cybersecurity for SCADA Systems
Cybersecurity for SCADA Systems, 2nd Edition is intended to provide a general background of SCADA system technology and cybersecurity concepts and technologies, showing how the two can be brought together to safeguard our infrastructure and computer automation systems. This book provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues and learn strategies for decreasing or eliminating system vulnerabilities. Cybersecurity for SCADA Systems, 2nd Edition is suitable for nontechnical, management-level personnel as well as IT personnel without SCADA experience. 

Features and Benefits

  • Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system
  • IT and cybersecurity technology and terminology overview and explanation
  • Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies
  • Discussion of physical and electronic security issues and strategies

Audience

  • IT personnel
  • Management
  • Students
1138730835
Cybersecurity for SCADA Systems
Cybersecurity for SCADA Systems, 2nd Edition is intended to provide a general background of SCADA system technology and cybersecurity concepts and technologies, showing how the two can be brought together to safeguard our infrastructure and computer automation systems. This book provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues and learn strategies for decreasing or eliminating system vulnerabilities. Cybersecurity for SCADA Systems, 2nd Edition is suitable for nontechnical, management-level personnel as well as IT personnel without SCADA experience. 

Features and Benefits

  • Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system
  • IT and cybersecurity technology and terminology overview and explanation
  • Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies
  • Discussion of physical and electronic security issues and strategies

Audience

  • IT personnel
  • Management
  • Students
119.0 In Stock
Cybersecurity for SCADA Systems

Cybersecurity for SCADA Systems

by William T. Shaw
Cybersecurity for SCADA Systems

Cybersecurity for SCADA Systems

by William T. Shaw

Hardcover(2nd ed.)

$119.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Cybersecurity for SCADA Systems, 2nd Edition is intended to provide a general background of SCADA system technology and cybersecurity concepts and technologies, showing how the two can be brought together to safeguard our infrastructure and computer automation systems. This book provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues and learn strategies for decreasing or eliminating system vulnerabilities. Cybersecurity for SCADA Systems, 2nd Edition is suitable for nontechnical, management-level personnel as well as IT personnel without SCADA experience. 

Features and Benefits

  • Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system
  • IT and cybersecurity technology and terminology overview and explanation
  • Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies
  • Discussion of physical and electronic security issues and strategies

Audience

  • IT personnel
  • Management
  • Students

Product Details

ISBN-13: 9781593705060
Publisher: PennWell Corporation
Publication date: 01/01/2021
Edition description: 2nd ed.
Pages: 499
Product dimensions: 6.00(w) x 9.00(h) x (d)

About the Author

Dr. William (Tim) Shaw - CISSP, C|EH, CPT, CAP. Over 40 years of industry experience designing and deploying DCS, SCADA and PLC based industrial control and automation systems in a range of industries including Electric power, Oil and Gas pipelines, Refining, Water and Waste-Water, Petrochemical, Steel, Glass, Pharmaceuticals, Wind Turbines and Substation Automation.

Table of Contents

  • Chapter 1
    • The technological evolution of SCADA systems
    • The Early History of SCADA-Mainframes
    • Minicomputers and Microprocessors
    • Central Architectures
    • Distributed Architectures
    • Client/Server Designs
    • Technological Convergence
    • Ubiquitous Internet and IP Networking
    • Generalized Software Architecture
  • Chapter 2
    • Remote terminal units
    • Basic Features and Functions
    • Smart RTU Technology
    • Top-Down and Bottom-Up Configuration
    • The Emergence of PLCs
    • Legacy Protocols
    • Protocol Standards
    • IP-Ready RTUs and Protocols
  • Chapter 3
    • Telecommunications technologies
    • Voice-Grade (Analog) Telephony
    • Commercial Voice/Data Carriers
    • Options for Wireless Communications
    • Digital Networking Technologies
    • TCP/IP Networking
    • The Internet
  • Chapter 4
    • Supervisory control applications
    • Operating System Utilities
    • SCADA System Utilities
    • Program Development Tools
    • Standardized APIs
  • Chapter 5
    • Operator interface
    • Access-Control Mechanisms
    • Standard System Displays
    • Site/Industry-Specific Displays
    • Historical Trending
    • Logs and Reports
  • Chapter 6
    • Conventional information technology
    • Availability, Integrity, and Confidentiality
    • Remote Access/Connectivity
    • TCP/IP Suite
    • Firewalls & Routers
    • Wireless LANs
    • Authentication and Validation
    • Encryption and Ciphers
  • Chapter 7
    • Identifying cybersecurity vulnerabilities
    • Threats and Threat Agents
    • Obvious Points of Attack and Vulnerability
  • Chapter 8
    • Malware, cyberattacks and hacking tools
    • Vulnerabilities
    • WEB Server/SQL Injection
    • Email and Web browsing
    • Malware
  • Chapter 9
    • Physical security
    • Access Controls
    • Access tracking
    • Illegal-entry Alarms
    • Physical Isolation of Assets: Layers of Defense
    • Physical Protection of Materials and Information
    • Critical Ancillary Subsystems
    • Remote and Field Sites
  • Chapter 10
    • Operational security
    • Policies and Administrative Controls
    • Procedures
    • Operational Differences
    • Training
    • Recovery Procedures
    • Annual Review
    • Background Checks
  • Chapter 11
    • Computer systems & Network security
  • Chapter 12
    • Electric utility industry-specific cybersecurity issues
    • Substation Backdoors
    • IP to the Substation
    • TASE
    • UCA2 (IEC61850)
    • DNP3
    • NERC 1200/1300 Compliance
  • Chapter 13
    • Water/Wastewater industry-specific cybersecurity issues
    • Licensed Radio Communications
    • Nonsecure Protocols
    • PLC Equipment as RTUs
    • Supervisory and Local Control Applications
    • Municipal LANs and WANs
    • Control Interfaces to Plant Control Systems
  • Chapter 14
    • Pipeline industry-specific cybersecurity issues
    • Radio Communications
    • Smart RTUs
    • RTU Program Logic
    • Supervisory Control Applications
    • IP along the Pipeline
    • Web Browsing and Email Integration
  • Chapter 15
    • The cyberthreat to SCADA systems
  • Chapter 16
    • Commercial product vulnerabilities 
From the B&N Reads Blog

Customer Reviews