Index

  • 6LowPAN, 37
  • 802.15.4, 37

A

  • accountability, 59
  • AIC criteria, 57
  • AMQP, 54
  • anomaly, 266
  • architecture security, 253
  • ARP, 42
  • asset, 70
  • attack(s), 91, 71
  • Aurora, 114

B

  • backdoor, 101
  • BCPS, 8
  • blue team, 138
  • botnet, 102
  • bowtie diagram, 211
  • brute force, 104
  • buffer overflow, 103

C

  • Censys, 139
  • CHAZOP, 243
  • CIP, 50
  • CMMI, 182
  • CoAP, 54
  • conduit, 182
  • confidentiality, 59
  • ControlNet, 50
  • Converged Plantwide EtherNet, 27
  • CSET, 130
  • cyber-APR, 239
  • cyber
    • bowtie diagram, 245
    • HAZOP, 243
    • risk reduction factor, 187

D

  • data-diode, 260
  • DCS, 5
  • DDoS, 102
  • defense in depth, 80
  • dematerialized zone, 254
  • denial of service, 110
  • DeviceNet, 50
  • differences between IT and OT systems, 64
  • directive
  • DMZ, 254
  • DNP3, 48

E

  • EBIOS, 221
  • Ethernet, 35
  • Ethernet/IP, 50
  • EtherNet/IP, 51

F, G, H

I

  • IACS, 169
  • ICMP, 42
  • IEC
  • IED, 13
  • IIoT, 5, 30
  • impact, 70
  • Industrial
    • control system, 2
    • internet consortium, 159
  • internal fraud, 114
  • inventory, 249
  • IoT platform, 21
  • IP, 39
  • ISMS, 82
  • ISSP, 87
  • IT, 4
  • IT/OT convergence, 68

L, M

  • Ladder diagram, 11
  • LAN, 33
  • level(s)
    • of protection, 183
  • life cycle, 22
  • logical bomb, 101
  • LOPA, 208
  • LPM, 163
  • lSA100.11a, 37
  • LTE, 38
  • Man-in-the-Middle, 109
  • mapping, 249
  • Maturity Level, 182
  • Modbus, 45
  • MQTT, 53

N, O, P

  • NIDS, 262
  • NIST Cyber Security Framework, 273
  • NIST Framework, 145
  • non-repudiation, 59
  • OIV, 163
  • OPC, 51
  • OPC-UA, 52
  • OSE, 164
  • OSI, 34
  • OT, 4
  • PAC, 13
  • PDCA, 83
  • pentest, 137
  • PHA, 204
  • Philips Hue lamps, 116
  • phishing, 113
  • PLC, 8
  • port scan, 111
  • Profibus, 46
  • protection level, 183
  • purdue model, 26

R

S

  • SCADA, 4
  • scenario, 74
  • secure
  • security program elements, 189
  • Shodan, 139
  • SIEM, 268
  • signature, 265
  • SIL, 199
  • SIS, 200
  • SL, 174
  • SL-T, 177
  • SmartContracts, 305
  • spyware, 101
  • SQL injection, 108
  • STRIDE, 216
  • Stuxnet, 115
  • Switch, 19
  • SYN, 40
    • flood, 41
  • system
    • class, 155
    • cyber-physical, 1
    • information, 1
    • integrators, 170
    • security management, 82

T, U, V

  • TCP, 39
  • threat, 71
  • tree
  • Triton, 116
  • Trojan horse, 100
  • UDP, 42
  • virus, 100
  • VPN, 34
  • vulnerabilty/vulnerabilities, 128
  • VxWorks, 12

W, X, Z

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.14.130.24