Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS
By: Macaulay, Tyson & Singer, Bryan.
Material type: BookPublisher: Boca tatan, FL, USA CRC Press/Auerbach Publications/taylor & Francis Group 2012Description: 193.ISBN: 978-1-4398-0196-3.Subject(s): ElectricalDDC classification: 658.478 Summary: The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.Item type | Current location | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Books | BSDU Knowledge Resource Center, Jaipur Reference | Reference | 658.478 JHA (Browse shelf) | Not For Loan | 014495 |
Introduction
Convergence by Another Name
Threats to ICS
ICS Vulnerabilities
Risk Assessment Techniques
What Is Next in ICS Security?
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.
There are no comments for this item.