Securing Scada Systems

by
Edition: 1st
Format: Hardcover
Pub. Date: 2005-11-28
Publisher(s): Wiley
List Price: $64.00

Buy New

Usually Ships in 8 - 10 Business Days.
$63.68

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$57.60
$57.60

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage-and what can be done to prevent this from happening Examines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets

Author Biography

RONALD L. KRUTZ, PhD, P. E., CISSP, ISSEP, is Senior Information Security Researcher for Lockheed Martin Information Technologies. He has worked with distributed computing systems, computer architectures, real-time systems, and information security for more than forty years. Dr. Krutz founded the Carnegie Mellon Research Institute Cybersecurity Center and is coauthor of the bestselling CISSP Prep Guide, also published by Wiley.

Table of Contents

About the Author.
Acknowledgments.
Introduction.
Chapter 1: What Is a SCADA System?
Chapter 2: SCADA Systems in the Critical Infrastructure
Chapter 3: The Evolution of SCADA Protocols.
Chapter 4: SCADA Vulnerabilities and Attacks.
Chapter 5: SCADA Security Methods and Techniques.
Chapter 6: SCADA Security Standards and Reference Documents.
Chapter 7: SCADA Security Management Implementation Issues and Guidelines.
Chapter 8: Where We Stand Today.
Appendix A: Acronyms and Abbreviations.
Appendix B: System Protection Profile — Industrial Control Systems.
Appendix C: Bibliography.
Index.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.