
Industrial Network Security
Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Description
Key Features
- All-new real-world examples of attacks against control systems, and more diagrams of systems
- Expanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443
- Expanded coverage of Smart Grid security
- New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering
Readership
Table of Contents
- About the Authors
- Preface
- Acknowledgments
- Chapter 1: Introduction
- Book overview and key learning points
- Book audience
- Diagrams and figures
- The smart grid
- How this book is organized
- Conclusion
- Chapter 2: About Industrial Networks
- Abstract
- The use of terminology within this book
- Common industrial security recommendations
- Advanced industrial security recommendations
- Common misperceptions about industrial network security
- Summary
- Chapter 3: Industrial Cyber Security History and Trends
- Abstract
- Importance of securing industrial networks
- The evolution of the cyber threat
- Insider threats
- Hacktivism, cyber crime, cyber terrorism, and cyber war
- Summary
- Chapter 4: Introduction to Industrial Control Systems and Operations
- Abstract
- System assets
- System operations
- Process management
- Safety instrumented systems
- The smart grid
- Network architectures
- Summary
- Chapter 5: Industrial Network Design and Architecture
- Abstract
- Introduction to industrial networking
- Common topologies
- Network segmentation
- Network services
- Wireless networks
- Remote access
- Performance considerations
- Safety instrumented systems
- Special considerations
- Summary
- Chapter 6: Industrial Network Protocols
- Abstract
- Overview of industrial network protocols
- Fieldbus protocols
- Backend protocols
- Advanced metering infrastructure and the smart grid
- Industrial protocol simulators
- Summary
- Chapter 7: Hacking Industrial Control Systems
- Abstract
- Motives and consequences
- Common industrial targets
- Common attack methods
- Examples of weaponized industrial cyber threats
- Attack trends
- Dealing with an infection
- Summary
- Chapter 8: Risk and Vulnerability Assessments
- Abstract
- Cyber security and risk management
- Methodologies for assessing risk within industrial control systems
- System characterization
- Threat identification
- Vulnerability identification
- Risk Classification and Ranking
- Risk reduction and mitigation
- Summary
- Chapter 9: Establishing Zones and Conduits
- Abstract
- Security zones and conduits explained
- Identifying and classifying security zones and conduits
- Recommended security zone separation
- Establishing security zones and conduits
- Summary
- Chapter 10: Implementing Security and Access Controls
- Abstract
- Network segmentation
- Implementing network security controls
- Implementing host security and access controls
- How much security is enough?
- Summary
- Chapter 11: Exception, Anomaly, and Threat Detection
- Abstract
- Exception Reporting
- Behavioral anomaly detection
- Behavioral Whitelisting
- Threat Detection
- Summary
- Chapter 12: Security Monitoring of Industrial Control Systems
- Abstract
- Determining what to monitor
- Successfully monitoring security zones
- Information management
- Log storage and retention
- Summary
- Chapter 13: Standards and Regulations
- Abstract
- Common standards and regulations
- ISA/IEC-62443
- Mapping industrial network security to compliance
- Industry best practices for conducting ICS assessments
- Common Criteria and FIPS Standards
- Summary
- Appendix A: Protocol Resources
- Appendix B: Standards Organizations
- Appendix C: NIST Security Guidelines
- Glossary
- Index
Product details
- No. of pages: 460
- Language: English
- Copyright: © Syngress 2014
- Published: December 9, 2014
- Imprint: Syngress
- Paperback ISBN: 9780124201149
- eBook ISBN: 9780124201842
About the Authors
Eric Knapp
Affiliations and Expertise
Joel Langill
Affiliations and Expertise
Ratings and Reviews
Latest reviews
(Total rating for all reviews)
Uri G. Sat Dec 22 2018
Uri G.
A very good book ! It gives a wide view on industrial network cyber security challenges which the industry is facing. The book is very easy to understand for those who are not familiar with the OT world. The chapters are in a sensible order which helps on the one hand to get the general ideas and on the other hand to get the relevant tools in order to transform the ideas into a practical approach.