Overview
- Editors:
-
-
Edward J. M. Colbert
-
US Army Research Laboratory, Adelphi, USA
-
Alexander Kott
-
US Army Research Laboratory, Adelphi, USA
- Offers academic, industrial and government perspective from international experts in the security field
- Provides comprehensive structured treatment of the subject and easy-to-read tutorial information
- Demonstrates how ICS cyber security can lower the risk for malfunction for critical infrastructure such as chemical plants, electric utilities, distribution and transportation systems, and commercial and military production plants
Access this book
Other ways to access
Table of contents (16 chapters)
-
-
- Alexander Kott, Carlos Aguayo Gonzalez, Edward J. M. Colbert
Pages 1-13
-
- Daniel Sullivan, Eric Luiijf, Edward J. M. Colbert
Pages 15-28
-
- Selcuk Uluagac, Kemal Akkaya, Apurva Mohan, Mehmet H. Cintuglu, Tarek Youssef, Osama Mohammed et al.
Pages 29-49
-
-
-
-
- Angelyn S. Flowers, Sidney C. Smith, Alessandro Oltramari
Pages 111-132
-
- Matthew H. Henry, David R. Zaret, J. Ryan Carr, J. Daniel Gordon, Ryan M. Layer
Pages 133-166
-
- Zachary A. Collier, Mahesh Panwar, Alexander A. Ganin, Alexander Kott, Igor Linkov
Pages 167-185
-
- Blaine Hoffman, Norbou Buchler, Bharat Doshi, Hasan Cam
Pages 187-208
-
- Edward J. M. Colbert, Steve Hutchinson
Pages 209-237
-
- Carlos Aguayo Gonzalez, Jeffrey Reed
Pages 239-251
-
- Vincent Urias, Brian Van Leeuwen
Pages 253-277
-
-
-
- Misty Blowers, Jose Iribarne, Edward J. M. Colbert, Alexander Kott
Pages 323-355
About this book
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.
Reviews
“The book, which contains a few color illustrations, includes contributions from many authors with varying backgrounds. … the editors have produced a consistent book. The chapters include many references to the literature … . There are very few books in the market on the cyber-security of ICSs … so this book is a welcome addition. … it is quite readable even by novices. It can be used for teaching a course on the security of ICSs.” (S. V. Nagaraj, Computing Reviews, April, 2017)