Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

This Item is no longer available
We're unable to show you buying options for this item.

About this item

Important Made in USA Origin Disclaimer: For certain items sold by Walmart on Walmart.com, the displayed country of origin information may not be accurate or consistent with manufacturer information. For updated, accurate country of origin data, it is recommended that you rely on product packaging or manufacturer information.
Other, Auerbach Publications, 2009, ISBN13 9781439801963, ISBN10 1439801967

About this item

Important Made in USA Origin Disclaimer: For certain items sold by Walmart on Walmart.com, the displayed country of origin information may not be accurate or consistent with manufacturer information. For updated, accurate country of origin data, it is recommended that you rely on product packaging or manufacturer information.

Other, Auerbach Publications, 2009, ISBN13 9781439801963, ISBN10 1439801967

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

Specifications

Number of Pages: 193
Languages: English
Number in Series: 1
Author: Singer, Bryan ,  Macaulay, Tyson
Publisher: Taylor & Francis
ISBN-13: 9781439801963
ISBN-10: 1439801967
Show

Customer Reviews

Be the first to review this item. Share your rating and review so that other customers can decide if this is the right item for them.

Customer Q&A

Back
Questions & Answers 0 questions

Ask a question

If you would like to share feedback with us about pricing, delivery or other customer service issues, please contact customer service directly.


Q&A tips and guidelines

Q&A Exchange Guidelines

When writing your question or answer, please follow these guidelines:

  • Do: Make sure your question is directly related to the product
  • Do: Be specific and provide as many details as possible
  • Do: Include the model number (if applicable)
  • Do: Write your question in English
  • Do Not: Include personal information (such as your full name)
  • All submitted questions and answers are subject to the terms set forth in our Terms and Conditions

We reserve the right not to post your question or answer if it contains any of the following:

  • Any information not related to the actual merchandise or topic
  • Obscenities, discriminatory language or other language not suitable for a public forum
  • Advertisements or “spam” content
  • Email addresses, physical addresses or other forms of contact information
  • Critical or spiteful comments on other questions or answers posted on the page or their authors
  • Any imagery that demonstrates incorrect use of the merchandise
  • Anything that Walmart deems to be inappropriate, at Walmart's discretion

Provide as many details as possible, including the model number (if applicable).

Remember: Don’t include personal information (such as your full name).


Preview Question

Thank you.

Questions will be checked against our question guidelines and posted within five to seven business days.

Policies & Plans

See any care plans, options and policies that may be associated with this product.

Gifting plans

Gift options are not available for this item.

Pricing policy

About our prices
We’re committed to providing low prices every day, on everything. So if you find a current lower price from an online retailer on an identical, in-stock product, tell us and we’ll match it. See more details at Online Price Match.