Securing SCADA Systems
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Securing SCADA Systems

 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780471787686
Veröffentl:
2005
Einband:
E-Book
Seiten:
240
Autor:
Ronald L. Krutz
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage-and what can be done to prevent this from happening Examines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets
* Bestselling author Ron Krutz once again demonstrates hisability to make difficult security topics approachable with thisfirst in-depth look at SCADA (Supervisory Control And DataAcquisition) systems* Krutz discusses the harsh reality that natural gas pipelinesnuclear plants, water systems, oil refineries, and other industrialfacilities are vulnerable to a terrorist or disgruntled employeecausing lethal accidents and millions of dollars of damage-and whatcan be done to prevent this from happening* Examines SCADA system threats and vulnerabilities, theemergence of protocol standards, and how security controls can beapplied to ensure the safety and security of our nationalinfrastructure assets
About the Author.Acknowledgments.Introduction.Chapter 1: What Is a SCADA System?Chapter 2: SCADA Systems in the Critical InfrastructureChapter 3: The Evolution of SCADA Protocols.Chapter 4: SCADA Vulnerabilities and Attacks.Chapter 5: SCADA Security Methods and Techniques.Chapter 6: SCADA Security Standards and Reference Documents.Chapter 7: SCADA Security Management Implementation Issues andGuidelines.Chapter 8: Where We Stand Today.Appendix A: Acronyms and Abbreviations.Appendix B: System Protection Profile -- Industrial ControlSystems.Appendix C: Bibliography.Index.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.