Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS
- Boca tatan, FL, USA CRC Press/Auerbach Publications/taylor & Francis Group 2012
- 193
Introduction Convergence by Another Name Threats to ICS ICS Vulnerabilities Risk Assessment Techniques What Is Next in ICS Security?
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.