Industrial Cyber Security
- Length: 451 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2017-12-11
- ISBN-10: 1788395158
- ISBN-13: 9781788395151
- Sales Rank: #495650 (See Top 100 Books)
Key Features
- Learn end point protection like anti-malware implementation, updating, monitoring, and sanitization of user workloads and mobile devices.
- Filled with practical examples to ensure you secure critical infrastructure systems efficiently.
- A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems.
Book Description
With industries expanding, threat to cyber-attack has increased significantly. It is very important to understand vulnerabilities of your control system and learn techniques on how you can defend critical infrastructure systems from cyber-threats. This book will get you well-versed with identifying unique challenges along with teaching you the methodologies and security measures needed to protect critical infrastructure systems,with the help of real-world use cases
This book will start with giving you a fair understanding about industrial cyber security its control systems and operations. Then, this book will talk about ICS architecture; communication mediums and field device architecture. Next, this book will also walk you through industrial protocols, network segmentation, wireless security and so on.
Later, this book will cover practical examples on protecting industrial control systems along with security assessment, governance, and risk management. Moving ahead, this book will also cover essential cyber security aspects like; cryptography, threat detection, access management and so on. Finally this book will cover topics on end point hardening like monitoring, updating, anti-malware implementation, and so on. By the end of this book, you will be able to achieve robust security for industrial control systems from design through retirement.
What you will learn
- Learn industrial cyber security its control systems and operations.
- Build Industrial Cyber Security architecture; communication mediums and field device architecture
- Configure industrial protocols, network segmentation, wireless security.
- Understand cryptography, threat detection, access management.
- Learn anti-malware implementation.
- Secure your industrial control systems from design through retirement.
Table of Contents
Chapter 1. Industrial Control Systems
Chapter 2. Insecure By Inheritance
Chapter 3. Anatomy Of An Ics Attack Scenario
Chapter 4. Industrial Control System Risk Assessment
Chapter 5. The Purdue Model And A Converged Plantwide Ethernet
Chapter 6. The Defense-In-Depth Model
Chapter 7. Physical Ics Security
Chapter 8. Ics Network Security
Chapter 9. Ics Computer Security
Chapter 10. Ics Application Security
Chapter 11. Ics Device Security
Chapter 12. The Ics Cybersecurity Program Development Process