Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Jean-Marie Flaus
Cybersecurity of Industrial Systems
Cover
Foreword
Introduction
1 Components of an Industrial Control System
1.1. Introduction
1.2. From the birth of the PLC to the SCADA system
1.3. Programmable logic controller (PLC)
1.4. RTU, master terminal unit and intelligent electronic device
1.5. Programmable Automation Controller
1.6. Industrial PC
1.7. Safety instrumented systems
1.8. Human–machine interface (HMI)
1.9. Historians
1.10. Programming and parameter setting stations
1.11. Industrial Internet of Things (IIoT)
1.12. Network equipment
1.13. Data processing platform
1.14. Lifecycle of an ICS
2 Architecture and Communication in an Industrial Control System
2.1. Network architecture
2.2. Different types of communication networks
2.3. Transport networks
2.4. Internet protocols
2.5. Industrial protocols
2.6. IoT protocols
3 IT Security
3.1. Security objectives
3.2. Differences between IT and OT systems
3.3. Risk components
3.4. Risk analysis and treatment process
3.5. Principle of defense in depth
3.6. IT security management
3.7. Risk treatment process
3.8. Governance and security policy for IT systems
3.9. Security management of industrial systems
4 Threats and Attacks to ICS
4.1. General principle of an attack
4.2. Sources of threats
4.3. Attack vectors
4.4. Main categories of malware
4.5. Attacks on equipment and applications
4.6. Site attacks and via websites
4.7. Network attacks
4.8. Physical attacks
4.9. Attacks using the human factor
4.10. History of attacks on ICS
4.11. Some statistics
5 Vulnerabilities of ICS
5.1. Introduction
5.2. Generic approach to vulnerability research
5.3. Attack surface
5.4. Vulnerabilities of SCADA industrial systems
5.5. Vulnerabilities of IoT industrial systems
5.6. Systematic analysis of vulnerabilities
5.7. Practical tools to analyze technical vulnerability
6 Standards, Guides and Regulatory Aspects
6.1. Introduction
6.2. ISO 27000 family
6.3. NIST framework and guides
6.4. Distribution and production of electrical energy
6.5. Nuclear industry
6.6. Transportation
6.7. Other standards
6.8. ANSSI’s approach
6.9. Good practices for securing industrial Internet of Things equipment
6.10. Legislative and regulatory aspects
7 The Approach Proposed by Standard 62443
7.1. Presentation
7.2. IACS lifecycle and security stakeholders
7.3. Structure of the IEC 62443 standard
7.4. General idea of the proposed approach
7.5. Basics of the standard
7.6. Risk analysis
7.7. Security management
7.8. Assessment of the level of protection
7.9. Implementation of the IEC 62443 standard
8 Functional Safety and Cybersecurity
8.1. Introduction
8.2. IEC 61508 standard and its derivatives
8.3. Alignment of safety and security
8.4. Risk analysis methods used in operational safety
9 Risk Assessment Methods
9.1. Introduction
9.2. General principle of a risk analysis
9.3. EBIOS method
9.4. Attack trees
9.5. Cyber PHA and cyber HAZOP
9.6. Bowtie cyber diagram
9.7. Risk analysis of IIoT systems
10 Methods and Tools to Secure ICS
10.1. Identification of assets
10.2. Architecture security
10.3. Firewall
10.4. Data diode
10.5. Intrusion detection system
10.6. Security incident and event monitoring
10.7. Secure element
11 Implementation of the ICS Cybersecurity Management Approach
11.1. Introduction
11.2. Simplified process
11.3. Detailed approach
11.4. Inventory of assets
11.5. Risk assessment
11.6. Governance and ISMS
11.7. Definition of the security policy and procedures
11.8. Securing human aspects
11.9. Physical security
11.10. Network security
11.11. Securing exchanges by removable media
11.12. Securing machines
11.13. Data security and configuration
11.14. Securing logical accesses
11.15. Securing supplier and service provider interactions
11.16. Incident detection
11.17. Security monitoring
11.18. Incident handling
11.19. Recovery
11.20. Cybersecurity and lifecycle
Appendix 1: Cryptography Basics
Appendix 2: Blockchain and IIoT Security
Appendix 3: NIST SP 800-82 Security Measures
Appendix 4: ANSSI Security Measures
Appendix 5: Additions to the IEC 62433 Standard
Appendix 6: Some Tools
List of acronyms and abbreviations
References
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Other titles from iSTE in Systems and Industrial Engineering – Robotics
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset