Cargando…
Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS
SCADA - Supervisory Control and Data Acquisition - Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external I...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
CRC Press
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1488132 |
_version_ | 1780926268132294656 |
---|---|
author | Macaulay, Tyson Singer, Bryan |
author_facet | Macaulay, Tyson Singer, Bryan |
author_sort | Macaulay, Tyson |
collection | CERN |
description | SCADA - Supervisory Control and Data Acquisition - Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed 'cookbook' that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern. |
id | cern-1488132 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
publisher | CRC Press |
record_format | invenio |
spelling | cern-14881322020-07-16T20:02:23Zhttp://cds.cern.ch/record/1488132engMacaulay, TysonSinger, BryanCybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SISComputing and ComputersSCADA - Supervisory Control and Data Acquisition - Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed 'cookbook' that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern.CRC Pressoai:cds.cern.ch:14881322011 |
spellingShingle | Computing and Computers Macaulay, Tyson Singer, Bryan Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS |
title | Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS |
title_full | Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS |
title_fullStr | Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS |
title_full_unstemmed | Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS |
title_short | Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS |
title_sort | cybersecurity for industrial control systems: scada, dcs, plc, hmi, and sis |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1488132 |
work_keys_str_mv | AT macaulaytyson cybersecurityforindustrialcontrolsystemsscadadcsplchmiandsis AT singerbryan cybersecurityforindustrialcontrolsystemsscadadcsplchmiandsis |