Overview
- Provides a comprehensive treatment of the state-of-the-art tools and techniques available for designing secure and resilient industrial control systems, including research prototypes
- Explores the relationships between cyber, physical and human aspects in industrial control systems and their impact on security and resiliency
- Brings in both the theoreticians’ and practitioners’ point of view in security and resiliency
- Offers perspective from international experts in academia, industry and government on where R&D technologies should transition over the next few years to mitigate cyber risk to industrial control systems and ensure their mission continuity
Part of the book series: Advances in Information Security (ADIS, volume 75)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (12 chapters)
-
Current and New Practice
-
Cyber-Modeling, Detection, and Forensics
-
Proactive Defense Mechanism Design
-
Human System Interface
-
Metrics
Keywords
About this book
Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Suchresilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems.
This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
Editors and Affiliations
About the editors
Indrajit Rayis a Professor at the Computer Science Department at Colorado State University. He received his PhD in Information Technology from George Mason University in Fairfax, VA in 1997. His main research interests are in the areas of data and application security, network security, security modeling, risk management, trust models, privacy and digital forensics. He is a member of the Data and Applications Security Group, the Network Security Group, and the Software Assurance Laboratory at Colorado State University. His research has been funded by the U.S. National Science Foundation, the Air Force Office of Scientific Research, the Air Force Research Laboratory and the Federal Aviation Administration. He is a member of IEEE Computer Society, ACM, ACM Special Interest Group on Security Audit and Control, IFIP WG 11.3 on Data and Applications Security and IFIP WG 11.9 on Digital Forensics.
Quanyan Zhu is an Assistant Professor at the Department of Electrical and Computer Engineering at the Polytechnic School of Engineering at the New York University, NY, USA. He received his PhD in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2013. His main research interests are in the areas of Game Theory and Applications, Resilient and Secure Socio-Cyber-Physical Systems, Adversarial Machine Learning and Signal Processing, Human-Robot Interactions, Internet of Things, Game and Decision Theory for Cyber Security, Economics and Optimization of Infrastructure Systems, and Resource Allocations in Communication Networks.
Michael Haney is an Assistant Professor of Computer Science for the University of Idaho and a cybersecurity researcher for the Idaho National Laboratory. He received his master's and doctorate in computer science from the University of Tulsa in 2013 and 2015, respectively. Currently, his research interests are in data visualization, specifically visualizing network andsystem log data to improve intrusion detection and response for large-scale networks. He studies cyber-security issues of energy assurance supporting a more resilient "smart" infrastructure. His focus here lies in honeypot research — creating systems that mimic real power generation systems, oil refineries or water treatment plants, and recording and studying the cyber-attacks against these systems.
Bibliographic Information
Book Title: Industrial Control Systems Security and Resiliency
Book Subtitle: Practice and Theory
Editors: Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
Series Title: Advances in Information Security
DOI: https://doi.org/10.1007/978-3-030-18214-4
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2019
Hardcover ISBN: 978-3-030-18213-7Published: 30 October 2019
Softcover ISBN: 978-3-030-18216-8Published: 30 October 2020
eBook ISBN: 978-3-030-18214-4Published: 29 August 2019
Series ISSN: 1568-2633
Series E-ISSN: 2512-2193
Edition Number: 1
Number of Pages: X, 276
Number of Illustrations: 17 b/w illustrations, 81 illustrations in colour
Topics: Security, Computer Communication Networks, Communications Engineering, Networks, Artificial Intelligence