Atnaujinkite slapukų nuostatas

Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT [Minkštas viršelis]

  • Formatas: Paperback / softback, 624 pages, aukštis x plotis x storis: 231x188x33 mm, weight: 1043 g
  • Išleidimo metai: 14-Jul-2022
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119883024
  • ISBN-13: 9781119883029
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 624 pages, aukštis x plotis x storis: 231x188x33 mm, weight: 1043 g
  • Išleidimo metai: 14-Jul-2022
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119883024
  • ISBN-13: 9781119883029
Kitos knygos pagal šią temą:
A practical roadmap to protecting against cyberattacks in industrial environments

In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security author Charles J. Brooks and electrical grid cybersecurity expert Philip Craig deliver an authoritative and robust discussion of how to meet modern industrial cybersecurity challenges. The book outlines the tools and techniques used by practitioners in the industry today, as well as the foundations of the professional cybersecurity skillset required to succeed on the SANS Global Industrial Cyber Security Professional (GICSP) exam.

Full of hands-on explanations and practical guidance, this book also includes:





Comprehensive coverage consistent with the National Institute of Standards and Technology guidelines for establishing secure industrial control systems (ICS) Rigorous explorations of ICS architecture, module and element hardening, security assessment, security governance, risk management, and more

Practical Industrial Cybersecurity is an indispensable read for anyone preparing for the Global Industrial Cyber Security Professional (GICSP) exam offered by the Global Information Assurance Certification (GIAC). It also belongs on the bookshelves of cybersecurity personnel at industrial process control and utility companies.

Practical Industrial Cybersecurity provides key insights to the Purdue ANSI/ISA 95 Industrial Network Security reference model and how it is implemented from the production floor level to the Internet connection of the corporate network. It is a valuable tool for professionals already working in the ICS/Utility network environment, IT cybersecurity personnel transitioning to the OT network environment, and those looking for a rewarding entry point into the cybersecurity field.
Introduction xxiii
Chapter 1 Industrial Control Systems
1(42)
Introduction
2(1)
Basic Process Control Systems
3(2)
Closed-Loop Control Systems
5(1)
Industrial Process Controllers
6(14)
Supervisory Control and Data Acquisition Systems
20(1)
System Telemetry
21(2)
Utility Networks
23(2)
OT/IT Network Integration
25(3)
Industrial Safety and Protection Systems
28(1)
Safety Instrument Systems
29(10)
Review Questions
39(2)
Exam Questions
41(2)
Chapter 2 ICS Architecture
43(100)
Introduction
44(1)
Network Transmission Media
45(1)
Copper Cabling
45(1)
Fiber-Optic Cabling
46(3)
Industrial Network Media Standards
49(3)
Ethernet Connectivity
52(1)
External Network Communications
53(2)
Transmission Media Vulnerabilities
55(1)
Field Device Architecture
56(2)
PLC I/O Sections
58(4)
PLC Implementations
62(1)
Industrial Sensors
63(8)
Final Control Elements/Actuators
71(2)
Relays
73(3)
Process Units
76(3)
Industrial Network Protocols
79(1)
Common Industrial Protocols
79(1)
EtherNet/IP Protocol
79(1)
Modbus
80(1)
ProfiNet/ProfiBus
81(1)
DNP3
82(1)
ICCP
83(1)
OPC
83(1)
BACnet
83(1)
Enterprise Network Protocols
84(1)
TCP/IP
84(5)
Dynamic Host Configuration Protocol
89(1)
Review Questions
90(1)
Exam Questions
91(4)
Chapter 3 Secure ICS Architecture
95(1)
Introduction
96(1)
Boundary Protection
97(1)
Firewalls
98(6)
Proxies
104(1)
Security Topologies
105(1)
Network Switches
106(2)
Routers
108(1)
Security Zoning Models
109(4)
Flat Network Topologies
113(9)
Network Segmentation
122(6)
Controlling Intersegment Data Movement
128(1)
Tunneling
128(1)
Wireless Networking
129(2)
Wireless Sensors
131(3)
Wireless Gateways
134(1)
Modems
135(2)
Review Questions
137(2)
Exam Questions
139(4)
Chapter 4 ICS Module and Element Hardening
143(62)
Introduction
145(1)
Endpoint Security and Hardening
145(1)
User Workstation Hardening
145(2)
BIOS Security Subsystems
147(1)
Additional Outer Perimeter Access Hardening
148(6)
Mobile Device Protection
154(1)
OS Security/Hardening
155(1)
File System Security
156(4)
Operating System Security Choices
160(1)
Linux SystemV vs Systemd
160(2)
Hardening Operating Systems
162(1)
Common Operating System Security Tools
162(7)
Virtualization
169(3)
Application Software Security
172(1)
Software Exploitation
172(1)
Information Leakage
173(1)
Applying Software Updates and Patches
174(1)
Database Hardening
174(1)
SQL Injection
175(2)
Anti-Malware
177(1)
Antivirus
178(1)
Anti-spyware
178(3)
Anti-Malware: Sanitization
181(1)
Embedded Device Security
182(2)
Meters
184(5)
Network Hardening
189(1)
OT/IT Network Security
189(2)
Server Security
191(2)
Hardening the Server OS
193(1)
Logical Server Access Control
194(2)
Hardening Network Connectivity Devices
196(5)
Review Questions
201(1)
Exam Questions
202(3)
Chapter 5 Cybersecurity Essentials for ICS
205(66)
Introduction
207(1)
Basic Security Tenets
208(1)
Confidentiality, Integrity, and Availability
208(1)
Availability in ICS Networks
209(1)
Nonrepudiation
210(1)
Principle of Least Privilege
211(1)
Separation of Duties
211(1)
Vulnerability and Threat Identification
212(1)
Nation-States
213(1)
Cyberterrorists
213(1)
Cybercriminals
214(2)
Insider Threats
216(1)
Events, Incidents, and Attacks
217(1)
Threat Vectors
217(13)
Weaponization
230(1)
Delivery
230(1)
Exploitation
231(1)
Installation
232(1)
Command and Control
233(1)
Actions on Objectives
233(1)
Attack Methods
234(17)
Unauthorized Access
251(9)
Cryptographies
260(2)
Encryption
262(2)
Digital Certificates
264(1)
Public Key Infrastructure
264(2)
Hashing
266(1)
Resource Constraints
267(1)
Review Questions
268(1)
Exam Questions
268(3)
Chapter 6 Physical Security
271(44)
Introduction
272(1)
Infrastructure Security
273(1)
Access Control
274(2)
Physical Security Controls
276(2)
Authentication Systems
278(8)
Remote Access Monitoring and Automated Access Control Systems
286(3)
Intrusion Detection and Reporting Systems
289(1)
Security Controllers
290(5)
Video Surveillance Systems
295(2)
Cameras
297(1)
IP Cameras
297(1)
Pan-Tilt-Zoom Cameras
298(8)
Physical Security for ICS
306(1)
Industrial Processes/Generating Facilities
307(1)
Control Center/Company Offices
307(2)
NERC CIP-006-1
309(2)
Review Questions
311(1)
Exam Questions
312(3)
Chapter 7 Access Management
315(32)
Introduction
316(1)
Access Control Models
317(1)
Mandatory Access Control
317(1)
Discretionary Access Control
318(1)
Role-Based Access Control
318(1)
Rule-Based Access Control
319(1)
Attribute-Based Access Control
319(1)
Context-Based Access Control
320(1)
Key Security Components within Access Controls
320(1)
Directory Services
321(1)
Active Directory
321(3)
Linux Directory Services
324(2)
Application Runtime and Execution Control
326(1)
User Access Management
326(2)
Establishing User and Group Accounts
328(2)
Group Account Security
330(1)
Network Authentication Options
331(1)
Establishing Resource Controls
332(2)
ICS Access Control
334(2)
Remote ICS Access Control
336(4)
Access Control for Cloud Systems
340(3)
Review Questions
343(1)
Exam Questions
344(3)
Chapter 8 ICS Security Governance and Risk Management
347(26)
Introduction
348(1)
Security Policies and Procedure Development
348(1)
Requirements
349(1)
Exceptions and Exemptions
350(1)
Standards
351(5)
ICS Security Policies
356(1)
Risk Management
357(1)
Asset Identification
358(1)
Risk Assessment
359(3)
Risk Identification Vulnerability Assessment
362(1)
Impact Assessment
363(1)
ICS Risk Assessments
364(2)
Risk Mitigation
366(1)
NERC CIP-008
367(2)
Review Questions
369(1)
Exam Questions
370(3)
Chapter 9 ICS Security Assessments
373(32)
Introduction
374(1)
Security Assessments
374(2)
ICS Device Testing
376(1)
Vulnerability
376(1)
Supply Chain
377(5)
Communication Robustness Testing
382(1)
Fuzzing
382(2)
ICS Penetration Testing
384(1)
The Pentest Process
385(7)
Security Testing Tools
392(1)
Packet Sniffers
392(1)
Network Enumeration/Port Scanning
393(2)
Port Scanning
395(1)
Vulnerability Scanning
395(6)
Review Questions
401(1)
Exam Questions
402(3)
Chapter 10 ICS Security Monitoring and Incident Response
405(48)
Introduction
407(1)
ICS Lifecycle Challenges
408(1)
Change Management
408(1)
Establishing a Security Baseline
409(2)
Change Management Documentation
411(1)
Configuration Change Management
412(2)
Controlling Patch Distribution and Installation for Systems
414(5)
Monitoring
419(1)
Event Monitoring
420(1)
Network Monitoring
421(2)
Security Monitoring
423(1)
Logging and Auditing
424(1)
Event Logging
425(8)
Incident Management
433(1)
The Incident Response Lifecycle
434(1)
Preparation
435(7)
Incident Response
442(3)
Recovery
445(1)
Post-Incident Activities
446(3)
Review Questions
449(1)
Exam Questions
450(3)
Chapter 11 Disaster Recovery and Business Continuity
453(28)
Introduction
454(1)
Business Continuity Plans
455(1)
System Redundancy
455(4)
Local Virtualized Storage
459(3)
System Backup and Restoration
462(1)
Backup Options
463(3)
Backup Media Rotation
466(1)
Securing Backup Media
467(1)
Other BCP Considerations
467(2)
Disaster Recovery
469(1)
Planning
470(2)
Documenting the Disaster Recovery Plan
472(1)
The Disaster Response/Recovery Team
473(2)
NERC CIP-009-6
475(2)
Review Questions
477(1)
Exam Questions
478(3)
Appendix A GICSP Objective Map
481(6)
ICS410.1 ICS: Global Industrial Cybersecurity Professional (GICSP) Objectives
482(1)
Overview
482(1)
ICS410.2: Architecture and Field Devices
483(1)
ICS410.3: Communications and Protocols
484(1)
ICS410.4: Supervisory Systems
485(1)
ICS410.5: Security Governance
485(2)
Appendix B Glossary
487(46)
Appendix C Standards and References
533(6)
Reference Links
536(3)
Appendix D Review and Exam Question Answers
539(32)
Chapter 1 Industrial Control Systems
540(2)
Review Question Answers
540(1)
Exam Question Answers
541(1)
Chapter 2 ICS Architecture
542(3)
Review Question Answers
542(2)
Exam Question Answers
544(1)
Chapter 3 Secure ICS Architecture
545(3)
Review Question Answers
545(2)
Exam Question Answers
547(1)
Chapter 4 ICS Modules and Element Hardening
548(3)
Review Question Answers
548(2)
Exam Question Answers
550(1)
Chapter 5 Cybersecurity Essentials for ICS
551(3)
Review Question Answers
551(2)
Exam Question Answers
553(1)
Chapter 6 Physical Security
554(2)
Review Question Answers
554(2)
Exam Question Answers
556(1)
Chapter 7 Access Management
556(3)
Review Question Answers
556(2)
Exam Question Answers
558(1)
Chapter 8 ICS Security Governance and Risk Management
559(2)
Review Question Answers
559(1)
Exam Question Answers
560(1)
Chapter 9 ICS Security Assessments
561(3)
Review Question Answers
561(2)
Exam Question Answers
563(1)
Chapter 10 ICS Security Monitoring and Incident Response
564(3)
Review Question Answers
564(1)
Exam Question Answers
565(2)
Chapter 11 Disaster Recovery and Business Continuity
567(4)
Review Question Answers
567(1)
Exam Question Answers
568(3)
Index 571
CHARLES J. BROOKS is the co-Owner and Vice President of Educational Technologies Group Inc and the co-Owner of eITPrep LLP. He oversees research and product development at those organizations and has authored several books, including the A+ Certification Training Guide and The Complete Introductory Computer Course. For the past eight years Charles has been lecturing and providing Instructor training for cybersecurity teachers throughout the U.S. and abroad. His latest projects have been associated with IT and OT cybersecurity courses and hands-on lab activities that include Cybersecurity Essentials Concepts & Practices; Cybersecurity Essentials Environments & Testing; and Industrial Network Cybersecurity.

PHILIP A. CRAIG JR is the founder of BlackByte Cyber Security, LLC, a consultancy formed to develop new cybersecurity tools and tactics for use in U.S Critical Infrastructure. He oversees research and product development for the U.S. Department of Energy (DOE), the Defense Advanced Research Projects Agency (DARPA), and the National Rural Electric Cooperative Association (NRECA), as well as providing expert knowledge in next generation signal isolation techniques to protect automated controls in energy generation, transmission, and distribution systems. Mr. Craig has authored regulation for both the Nuclear Regulatory Commission (NRC) and National Energy Reliability Corporation (NERC) and is an active cyber responder in federal partnerships for incident response.