A
- accountability, 59
- AIC criteria, 57
- AMQP, 54
- anomaly, 266
- architecture security, 253
- ARP, 42
- asset, 70
- attack(s), 91, 71
- Aurora, 114
B
- backdoor, 101
- BCPS,
- blue team, 138
- botnet, 102
- bowtie diagram, 211
- brute force, 104
- buffer overflow, 103
C
- Censys, 139
- CHAZOP, 243
- CIP, 50
- CMMI, 182
- CoAP, 54
- conduit, 182
- confidentiality, 59
- ControlNet, 50
- Converged Plantwide EtherNet, 27
- CSET, 130
- cyber-APR, 239
- cyber
- bowtie diagram, 245
- HAZOP, 243
- risk reduction factor, 187
D
- data-diode, 260
- DCS,
- DDoS, 102
- defense in depth, 80
- dematerialized zone, 254
- denial of service, 110
- DeviceNet, 50
- differences between IT and OT systems, 64
- directive
- DMZ, 254
- DNP3, 48
E
- EBIOS, 221
- Ethernet, 35
- Ethernet/IP, 50
- EtherNet/IP, 51
F, G, H
- Firewall, 20
- FMEA, 206
- functional safety, 200
- GDPR, 166
- good practices, 276
- GRAFCET, 11
- HART, 48
- HAZOP, 207
- HIDS, 263
- HMI, 15
I
- IACS, 169
- ICMP, 42
- IEC
- IED, 13
- IIoT, , 30
- impact, 70
- Industrial
- control system,
- internet consortium, 159
- internal fraud, 114
- inventory, 249
- IoT platform, 21
- IP, 39
- ISMS, 82
- ISSP, 87
- IT,
- IT/OT convergence, 68
L, M
- Ladder diagram, 11
- LAN, 33
- level(s)
- life cycle, 22
- logical bomb, 101
- LOPA, 208
- LPM, 163
- lSA100.11a, 37
- LTE, 38
- Man-in-the-Middle, 109
- mapping, 249
- Maturity Level, 182
- Modbus, 45
- MQTT, 53
N, O, P
- NIDS, 262
- NIST Cyber Security Framework, 273
- NIST Framework, 145
- non-repudiation, 59
- OIV, 163
- OPC, 51
- OPC-UA, 52
- OSE, 164
- OSI, 34
- OT,
- PAC, 13
- PDCA, 83
- pentest, 137
- PHA, 204
- Philips Hue lamps, 116
- phishing, 113
- PLC,
- port scan, 111
- Profibus, 46
- protection level, 183
- purdue model, 26
S
- SCADA,
- scenario, 74
- secure
- security program elements, 189
- Shodan, 139
- SIEM, 268
- signature, 265
- SIL, 199
- SIS, 200
- SL, 174
- SL-T, 177
- SmartContracts, 305
- spyware, 101
- SQL injection, 108
- STRIDE, 216
- Stuxnet, 115
- Switch, 19
- SYN, 40
- system
- class, 155
- cyber-physical,
- information,
- integrators, 170
- security management, 82
T, U, V
- TCP, 39
- threat, 71
- tree
- Triton, 116
- Trojan horse, 100
- UDP, 42
- virus, 100
- VPN, 34
- vulnerabilty/vulnerabilities, 128
- VxWorks, 12
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.