Cybersecurity for SCADA Systems
Saved in:
Online Access: |
Full text (MCPHS users only) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
OnixTransformation.OnixModel.CityOfPublication :
PennWell Books,
2021
|
Subjects: | |
Local Note: | ProQuest Ebook Central |
Table of Contents:
- Intro
- Contents
- Preface
- Acknowledgements
- Introduction: Industrial Automation in the Aftermath of 9/11
- Chapter 1. The technological evolution of scada systems
- The Early History of SCADA
- Mainframes
- Minicomputers and Microprocessors
- Central Architectures
- Distributed Architectures
- Client/Server Designs
- Technological Convergence
- Ubiquitous Internet and IP Networking
- Generalized Software Architecture
- Chapter 2. Remote terminal units
- Basic Features and Functions
- Smart RTU Technology
- Top-Down and Bottom-Up Configuration
- The Emergence of PLCs
- Legacy Protocols
- Protocol Standards
- IP-Ready RTUs and Protocols
- Chapter 3. Telecommunications technologies
- Voice-Grade (Analog) Telephony
- Commercial Voice/Data Carriers
- Options for Wireless Communications
- Digital Networking Technologies
- TCP/IP Networking.
- The Internet
- Chapter 4. Supervisory control applications
- Operating System Utilities
- SCADA System Utilities
- Program Development Tools
- Standardized APIs
- Chapter 5. Operator interface
- Access-Control Mechanisms
- Standard System Displays
- Site/Industry-Specific Displays
- Historical Trending
- Logs and Reports
- Chapter 6. Conventional information technology
- Availability, Integrity, and Confidentiality
- Remote Access/ Connectivity
- TCP/IP Suite
- Firewalls & Routers
- Wireless LANs
- Authentication and Validation
- Encryption and Ciphers
- Chapter 7. Identifying cybersecurity vulnerabilities
- Threats and Threat Agents
- Obvious Points of Attack and Vulnerability
- Chapter 8. Malware, cyberattacks and hacking tools
- Vulnerabilities
- WEB Server/SQL Injection
- Email and Web browsing
- Malware
- Chapter 9. Physical security
- Access Controls
- Access tracking
- Illegal-entry Alarms
- Physical Isolation of Assets: Layers of Defense
- Physical Protection of Materials and Information
- Critical Ancillary Subsystems
- Remote and Field Sites
- Chapter 10. Operational security
- Policies and Administrative Controls
- Procedures
- Operational Differences
- Training
- Recovery Procedures
- Annual Review
- Background Checks
- Chapter 11. Computer systems & Network security
- Chapter 12. Electric utility industry
- specific cybersecurity issues
- Substation Backdoors
- IP to the Substation
- TASE.2/ICCP Connections
- UCA2 (IEC61850)
- DNP3.0
- NERC 1200/1300 Compliance
- Chapter 13. Water/ Wastewater industry
- specific cybersecurity issues
- Licensed Radio Communications
- Nonsecure Protocols
- PLC Equipment as RTUs
- Supervisory and Local Control Applications
- Municipal LANs and WANs
- Control Interfaces to Plant Control Systems
- Chapter 14. Pipeline industry
- specific cybersecurity issues
- Radio Communications
- Smart RTUs
- RTU Program Logic
- Supervisory Control Applications
- IP along the Pipeline
- Web Browsing and Email Integration
- Chapter 15. The cyberthreat to scada systems