Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

English | 18 Oct. 2017 | ISBN: 1788395158 | ASIN: B0761XRTP9 | 456 Pages | AZW3 | 16.59 MB

Key Features

Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
Filled with practical examples to help you secure critical infrastructure systems efficiently
A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems

Book Description

With industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

What you will learn

Understand industrial cybersecurity, its control systems and operations
Design security-oriented architectures, network segmentation, and security support services
Configure event monitoring systems, anti-malware applications, and endpoint security
Gain knowledge of ICS risks, threat detection, and access management
Learn about patch management and life cycle management
Secure your industrial control systems from design through retirement

About the Author

Pascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and over 15 years of experience in designing, troubleshooting, and securing large-scale industrial control systems and the various types of network technologies they utilize. After more than a decade of hands-on, in-the-field experience, he joined Rockwell Automation in 2015 and is currently employed as Senior Consultant of Industrial Cybersecurity with the Network and Security Services Group. He recently became a digital nomad and now travels the world with his family while fighting cyber adversaries.

Table of Contents

Industrial Control Systems
Insecure by Inheritance
Anatomy of an ICS Attack Scenario
Industrial Control System Risk Assessment
The Perdue Reference Model for Industrial Control Systems
The Defense In-Depth Model
Physical ICS Security_SSR
ICS Network Security
ICS Computer Security
ICS Application Security
ICS Device Security
ICS Policies, Procedures and Security Planning

Download:

http://longfiles.com/2z1kh2zvsxtl/Industrial_Cybersecurity_Efficiently_secure_critical_infrastructure_systems.azw3.html

[Fast Download] Industrial Cybersecurity: Efficiently secure critical infrastructure systems


Ebooks related to "Industrial Cybersecurity: Efficiently secure critical infrastructure systems" :
Information Security: The Complete Reference, Second Edition
CompTIA Security+ Guide to Network Security Fundamentals, 5th Edition
Readings & Cases in Information Security
Network Security Monitoring: Basics for Beginners
HIPAA, Security, and Digital Risk
Zero Day Exploit: Countdown to Darkness by Rob Shein
Intelligence-Based Security in Private Industry
Rootkits for Dummies
Building an Effective Information Security Policy Architecture
Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide (2nd Edition)
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.