Macaulay, Tyson & Singer, Bryan

Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS - Boca tatan, FL, USA CRC Press/Auerbach Publications/taylor & Francis Group 2012 - 193

Introduction
Convergence by Another Name
Threats to ICS
ICS Vulnerabilities
Risk Assessment Techniques
What Is Next in ICS Security?

The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

978-1-4398-0196-3

Allied Informatics, Jaipur


Electrical

658.478 / JHA