Table of Contents

Cover

Title page

Copyright

About the Authors

Preface

Acknowledgments

Chapter 1: Introduction

Book overview and key learning points

Book audience

Diagrams and figures

The smart grid

How this book is organized

Conclusion

Chapter 2: About Industrial Networks

Abstract

The use of terminology within this book

Common industrial security recommendations

Advanced industrial security recommendations

Common misperceptions about industrial network security

Summary

Chapter 3: Industrial Cyber Security History and Trends

Abstract

Importance of securing industrial networks

The evolution of the cyber threat

Insider threats

Hacktivism, cyber crime, cyber terrorism, and cyber war

Summary

Chapter 4: Introduction to Industrial Control Systems and Operations

Abstract

System assets

System operations

Process management

Safety instrumented systems

The smart grid

Network architectures

Summary

Chapter 5: Industrial Network Design and Architecture

Abstract

Introduction to industrial networking

Common topologies

Network segmentation

Network services

Wireless networks

Remote access

Performance considerations

Safety instrumented systems

Special considerations

Summary

Chapter 6: Industrial Network Protocols

Abstract

Overview of industrial network protocols

Fieldbus protocols

Backend protocols

Advanced metering infrastructure and the smart grid

Industrial protocol simulators

Summary

Chapter 7: Hacking Industrial Control Systems

Abstract

Motives and consequences

Common industrial targets

Common attack methods

Examples of weaponized industrial cyber threats

Attack trends

Dealing with an infection

Summary

Chapter 8: Risk and Vulnerability Assessments

Abstract

Cyber security and risk management

Methodologies for assessing risk within industrial control systems

System characterization

Threat identification

Vulnerability identification

Risk Classification and Ranking

Risk reduction and mitigation

Summary

Chapter 9: Establishing Zones and Conduits

Abstract

Security zones and conduits explained

Identifying and classifying security zones and conduits

Recommended security zone separation

Establishing security zones and conduits

Summary

Chapter 10: Implementing Security and Access Controls

Abstract

Network segmentation

Implementing network security controls

Implementing host security and access controls

How much security is enough?

Summary

Chapter 11: Exception, Anomaly, and Threat Detection

Abstract

Exception Reporting

Behavioral anomaly detection

Behavioral Whitelisting

Threat Detection

Summary

Chapter 12: Security Monitoring of Industrial Control Systems

Abstract

Determining what to monitor

Successfully monitoring security zones

Information management

Log storage and retention

Summary

Chapter 13: Standards and Regulations

Abstract

Common standards and regulations

ISA/IEC-62443

Mapping industrial network security to compliance

Industry best practices for conducting ICS assessments

Common Criteria and FIPS Standards

Summary

Appendix A: Protocol Resources

Appendix B: Standards Organizations

Appendix C: NIST Security Guidelines

Glossary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.137.59