000 | 04012nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-319-32125-7 | ||
003 | DE-He213 | ||
005 | 20180206183023.0 | ||
007 | cr nn 008mamaa | ||
008 | 160823s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319321257 _9978-3-319-32125-7 |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber-security of SCADA and Other Industrial Control Systems _h[recurso electrónico] / _cedited by Edward J. M. Colbert, Alexander Kott. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXIX, 355 p. 94 illus., 60 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v66 |
|
505 | 0 | _aIntroduction and Preview -- Components of Industrial Control Systems -- Wireless Infrastructure in Industrial Control Systems -- Operational Technology and Information Technology in Industrial Control Systems -- Threats in Industrial Control Systems -- Attacks on Industrial Control Systems -- Security Taxonomies of Industrial Control Systems -- Cyber Risk in Industrial Control Systems -- Security Metrics in Industrial Control Systems -- Situational Awareness in Industrial Control Systems -- Intrusion Detection in Industrial Control Systems -- Cyber Physical Intrusion Detection -- Experimental Methods for Control System Security Research -- Governance and Assessment Strategies for Industrial Control Systems -- Responding to Attacks on Industrial Control Systems and SCADA Systems -- In Conclusion: The Future Internet of Things and Security of its Control Systems. | |
520 | _aThis book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputers. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aColbert, Edward J. M. _eeditor. |
|
700 | 1 |
_aKott, Alexander. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319321233 |
830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v66 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://dx.doi.org/10.1007/978-3-319-32125-7 |
912 | _aZDB-2-SCS | ||
942 | _cLIBRO_ELEC | ||
999 |
_c226459 _d226459 |