000 04012nam a22005415i 4500
001 978-3-319-32125-7
003 DE-He213
005 20180206183023.0
007 cr nn 008mamaa
008 160823s2016 gw | s |||| 0|eng d
020 _a9783319321257
_9978-3-319-32125-7
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aCyber-security of SCADA and Other Industrial Control Systems
_h[recurso electrónico] /
_cedited by Edward J. M. Colbert, Alexander Kott.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXIX, 355 p. 94 illus., 60 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v66
505 0 _aIntroduction and Preview -- Components of Industrial Control Systems -- Wireless Infrastructure in Industrial Control Systems -- Operational Technology and Information Technology in Industrial Control Systems -- Threats in Industrial Control Systems -- Attacks on Industrial Control Systems -- Security Taxonomies of Industrial Control Systems -- Cyber Risk in Industrial Control Systems -- Security Metrics in Industrial Control Systems -- Situational Awareness in Industrial Control Systems -- Intrusion Detection in Industrial Control Systems -- Cyber Physical Intrusion Detection -- Experimental Methods for Control System Security Research -- Governance and Assessment Strategies for Industrial Control Systems -- Responding to Attacks on Industrial Control Systems and SCADA Systems -- In Conclusion: The Future Internet of Things and Security of its Control Systems.
520 _aThis book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aComputers.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems and Communication Service.
650 2 4 _aData Encryption.
700 1 _aColbert, Edward J. M.
_eeditor.
700 1 _aKott, Alexander.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319321233
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v66
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://dx.doi.org/10.1007/978-3-319-32125-7
912 _aZDB-2-SCS
942 _cLIBRO_ELEC
999 _c226459
_d226459