Book Cover
E-book
Author Krutz, Ronald L., 1938-

Title Securing SCADA systems / Ronald L. Krutz
Published Indianapolis, Ind. : Wiley Pub., ©2006

Copies

Description 1 online resource (1 volume)
Contents Securing SCADA Systems; About the Author; Credits; Contents; Acknowledgments; Special Acknowledgment; Introduction; Chapter 1: What Is a SCADA System?; History of Critical Infrastructure Directives; SCADA System Evolution, Definitions, and Basic Architecture; SCADA System Architecture; SCADA Applications; SCADA System Security Issues Overview; SCADA System Desirable Properties; Summary; Chapter 2: SCADA Systems in the Critical Infrastructure; Employment of SCADA Systems; Why We Should Worry about These Operations; Summary; Chapter 3: The Evolution of SCADA Protocols
Evolution of SCADA ProtocolsBackground Technologies of the SCADA Protocols; SCADA Protocols; The Security Implications of the SCADA Protocols; Summary; Chapter 4: SCADA Vulnerabilities and Attacks; The Myth of SCADA Invulnerability; SCADA Risk Components; Managing Risk; SCADA Threats and Attack Routes; SCADA Honeynet Project; Summary; Chapter 5: SCADA Security Methods and Techniques; SCADA Security Mechanisms; SCADA Intrusion Detection Systems; SCADA Audit Logs; Security Awareness; Summary; Chapter 6: SCADA Security Standards and Reference Documents; ISO/IEC 17799:2005 and BS 7799-2:2002
ISA-TR99.00.01-2004, Security Technologies for Manufacturing and Control SystemsISA-TR99.00.02-2004, Integrating Electronic Security into the Manufacturing and Control Systems Environment; GAO-04-140T, Critical Infrastructure Protection, Challenges in Securing Control Systems; NIST, System Protection Profile for Industrial Control Systems (SPP ICS); Federal Information Processing Standards Publication (FIPS Pub) 199, Standards for Security Categorization of Federal Information and Information Systems, February 2004; Additional Useful NIST Special Publications; Summary
Chapter 7: SCADA Security Management Implementation Issues and GuidelinesManagement Impressions of SCADA Security; SCADA Culture; Unique Characteristics and Requirements of SCADA Systems; Limitations of Current Technologies; Guidance for Management in SCADA Security Investment; NIST Special Publication 800-26, Security Self- Assessment Guide for Information Technology Systems; Summary; Chapter 8: Where We Stand Today; The Status Today; The Oil and Gas Industry; Rail System Security; Port Security; Summary; Appendix A: Acronyms and Abbreviations
Appendix B: System Protection Profile -- Industrial Control SystemsDocument Control; Conventions and Terminology; Introduction; STOE Description; STOE Security Environment; Risks; Security Objectives; Appendix C: Bibliography; Index
Summary Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systemsKrutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage-and what can be done to prevent this from happeningExamines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets
Notes Title from title screen
Bibliography Includes bibliographical references and index
Subject Process control.
Data protection.
Computer security
Supervisory control systems.
Computer Security
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
Computer security
Data protection
Process control
Supervisory control systems
Form Electronic book
ISBN 047178768X
9780471787686