Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
Release Date: December, 2012. Copyright © 2013. 450 pages.
You must have an IGI Global account before adding an e-book to your shopping cart.
In Stock. Have it as soon as Mar. 17 with express shipping*.
DOI: 10.4018/978-1-4666-2659-1, ISBN13: 9781466626591, ISBN10: 1466626593, EISBN13: 9781466626904
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical.
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
Table of Contents and List of Contributors
Search this Book:
Christopher Laing, Atta Badii, Paul Vickers
Peter H. Jenney
Industrial Control System (ICS) cyber security is weak and exploitable. As evidenced by STUXNET’s attack on the Iranian Natanz1 nuclear facility in...
Reviews and Testimonials
While there are numerous benefits to be gained from the gradual convergence of cloud services, smart grid (the evolving intelligent electric grid), and mobile telecommunications, the changes they bring to the technology environment also open up that environment to new security vulnerabilities. In response, the contributors explore critical infrastructure, mitigation of and protection against attacks, and failure-recovery emergency response policy creation at both national and international levels. Topics addressed include: security threats and risks of intelligent building systems, detecting cyber attacks on SCADA (supervisory control and data acquisition) and other critical infrastructures, industrial control systems, assessing critical infrastructure in terms of cyber threats and protections, designing a security audit plan, fortifying large-scale networks, and more. Editors are Laing and Vickers (Northumbria U., UK), Badii (U. of Reading, UK).
– Annotation ©2013 Book News Inc. Portland, OR
- Critical Infrastructures
- Industrial Control Systems
- Risk Analysis and Assessment
- SCADA systems
- Security Testing
- Supervisory Control And Data Acquisition (SCADA)
- Threat Protection