Cybersecurity for SCADA Systems

Saved in:
Bibliographic Details
Online Access: Full text (MCPHS users only)
Main Author: Shaw, William T. (William Tim)
Format: Electronic eBook
Language:English
Published: OnixTransformation.OnixModel.CityOfPublication : PennWell Books, 2021
Subjects:
Local Note:ProQuest Ebook Central
Table of Contents:
  • Intro
  • Contents
  • Preface
  • Acknowledgements
  • Introduction: Industrial Automation in the Aftermath of 9/11
  • Chapter 1. The technological evolution of scada systems
  • The Early History of SCADA
  • Mainframes
  • Minicomputers and Microprocessors
  • Central Architectures
  • Distributed Architectures
  • Client/Server Designs
  • Technological Convergence
  • Ubiquitous Internet and IP Networking
  • Generalized Software Architecture
  • Chapter 2. Remote terminal units
  • Basic Features and Functions
  • Smart RTU Technology
  • Top-Down and Bottom-Up Configuration
  • The Emergence of PLCs
  • Legacy Protocols
  • Protocol Standards
  • IP-Ready RTUs and Protocols
  • Chapter 3. Telecommunications technologies
  • Voice-Grade (Analog) Telephony
  • Commercial Voice/Data Carriers
  • Options for Wireless Communications
  • Digital Networking Technologies
  • TCP/IP Networking.
  • The Internet
  • Chapter 4. Supervisory control applications
  • Operating System Utilities
  • SCADA System Utilities
  • Program Development Tools
  • Standardized APIs
  • Chapter 5. Operator interface
  • Access-Control Mechanisms
  • Standard System Displays
  • Site/Industry-Specific Displays
  • Historical Trending
  • Logs and Reports
  • Chapter 6. Conventional information technology
  • Availability, Integrity, and Confidentiality
  • Remote Access/ Connectivity
  • TCP/IP Suite
  • Firewalls & Routers
  • Wireless LANs
  • Authentication and Validation
  • Encryption and Ciphers
  • Chapter 7. Identifying cybersecurity vulnerabilities
  • Threats and Threat Agents
  • Obvious Points of Attack and Vulnerability
  • Chapter 8. Malware, cyberattacks and hacking tools
  • Vulnerabilities
  • WEB Server/SQL Injection
  • Email and Web browsing
  • Malware
  • Chapter 9. Physical security
  • Access Controls
  • Access tracking
  • Illegal-entry Alarms
  • Physical Isolation of Assets: Layers of Defense
  • Physical Protection of Materials and Information
  • Critical Ancillary Subsystems
  • Remote and Field Sites
  • Chapter 10. Operational security
  • Policies and Administrative Controls
  • Procedures
  • Operational Differences
  • Training
  • Recovery Procedures
  • Annual Review
  • Background Checks
  • Chapter 11. Computer systems & Network security
  • Chapter 12. Electric utility industry
  • specific cybersecurity issues
  • Substation Backdoors
  • IP to the Substation
  • TASE.2/ICCP Connections
  • UCA2 (IEC61850)
  • DNP3.0
  • NERC 1200/1300 Compliance
  • Chapter 13. Water/ Wastewater industry
  • specific cybersecurity issues
  • Licensed Radio Communications
  • Nonsecure Protocols
  • PLC Equipment as RTUs
  • Supervisory and Local Control Applications
  • Municipal LANs and WANs
  • Control Interfaces to Plant Control Systems
  • Chapter 14. Pipeline industry
  • specific cybersecurity issues
  • Radio Communications
  • Smart RTUs
  • RTU Program Logic
  • Supervisory Control Applications
  • IP along the Pipeline
  • Web Browsing and Email Integration
  • Chapter 15. The cyberthreat to scada systems