Industrial network security securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems

This book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. It provides a thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for...

Full description

Bibliographic Details
Main Authors: Knapp, Eric D., Langill, Joel Thomas (Author)
Format: eBook
Language:English
Published: Waltham, MA Syngress [2015]©2015, 2015
Edition:Second edition
Subjects:
Online Access:
Collection: Elsevier ScienceDirect eBooks - Collection details see MPG.ReNa
LEADER 02054nmm a2200325 u 4500
001 EB001076169
003 EBX01000000000000000838459
005 00000000000000.0
007 cr|||||||||||||||||||||
008 150812 ||| eng
020 |a 9780124201149 
020 |a 0124201849 
020 |a 9780124201842 
020 |a 0124201148 
020 |a 9780124201149 
100 1 |a Knapp, Eric D. 
245 0 0 |a Industrial network security  |h Elektronische Ressource  |b securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems  |c Eric D. Knapp, Joel Thomas Langill 
246 3 1 |a Securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems 
250 |a Second edition 
260 |a Waltham, MA  |b Syngress  |c [2015]©2015, 2015 
300 |a online resource (1 volume)  |b illustrations 
505 0 |a Includes bibliographical references and index 
653 |a Computer security 
653 |a Process control / Security measures 
700 1 |a Langill, Joel Thomas  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ESD  |a Elsevier ScienceDirect eBooks 
856 4 0 |u http://www.sciencedirect.com/science/book/9780124201149  |x Verlag  |3 Volltext 
082 0 |a 670.42/7 
520 |a This book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. It provides a thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. Topics Include: all-new real-world examples of attacks against control systems, and more diagrams of systems; expanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443, smart grid security; signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering. --