Securing SCADA Systems

Securing SCADA Systems

2.5 (8 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?


Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems. Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage, and what can be done to prevent this from happening. He examines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets.
show more

Product details

  • Hardback | 218 pages
  • 190 x 242 x 19mm | 602g
  • Hungry Minds Inc,U.S.
  • Foster City, United States
  • English
  • 1. Auflage
  • 0764597876
  • 9780764597879
  • 1,923,652

Back cover copy

How to secure systems that weren't built for securityWorldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security nightmare. In the first guidebook to specifically address this vital problem, a veteran systems security expert shows you how SCADA systems have developed and how to understand their components and architecture, recognize risks and vulnerabilities, and learn to use appropriate protocols and countermeasures to protect vital information from cyber-terrorism.Learn how to make SCADA systems safeUnderstand SCADA system architectures and componentsRecognize breaches in security and what makes SCADA systems vulnerableSee how SCADA security is critical at every level, from a small town's water supply to natural gas pipelines, oil refineries, and nuclear power plantsExamine system architecture and understand how it contributes to security or vulnerabilityExplore effective countermeasures and safeguards and see how to apply them in your organization Understand why needed security measures are not being used in some operationsAnalyze your situation and take appropriate steps
show more

Table of contents

About the Author. Acknowledgments. Introduction. Chapter 1: What Is a SCADA System? Chapter 2: SCADA Systems in the Critical Infrastructure Chapter 3: The Evolution of SCADA Protocols. Chapter 4: SCADA Vulnerabilities and Attacks. Chapter 5: SCADA Security Methods and Techniques. Chapter 6: SCADA Security Standards and Reference Documents. Chapter 7: SCADA Security Management Implementation Issues and Guidelines. Chapter 8: Where We Stand Today. Appendix A: Acronyms and Abbreviations. Appendix B: System Protection Profile - Industrial Control Systems. Appendix C: Bibliography. Index.
show more

About Ronald L. Krutz

RONALD L. KRUTZ, PhD, P. E., CISSP, ISSEP, is Senior Information Security Researcher for Lockheed Martin Information Technologies. He has worked with distributed computing systems, computer architectures, real-time systems, and information security for more than forty years. Dr. Krutz founded the Carnegie Mellon Research Institute Cybersecurity Center and is coauthor of the bestselling CISSP Prep Guide, also published by Wiley.
show more

Rating details

8 ratings
2.5 out of 5 stars
5 0% (0)
4 12% (1)
3 38% (3)
2 38% (3)
1 12% (1)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X