Securing industrial control systems and safety instrumented systems a practical guide for safeguarding mission and safety critical systems
Description
More Details
Notes
Table of Contents
Reviews from GoodReads
Citations
Bouhdada, J. (2024). Securing industrial control systems and safety instrumented systems: a practical guide for safeguarding mission and safety critical systems . Packt Publishing Ltd..
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Bouhdada, Jalal. 2024. Securing Industrial Control Systems and Safety Instrumented Systems: A Practical Guide for Safeguarding Mission and Safety Critical Systems. Birmingham, UK: Packt Publishing Ltd.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Bouhdada, Jalal. Securing Industrial Control Systems and Safety Instrumented Systems: A Practical Guide for Safeguarding Mission and Safety Critical Systems Birmingham, UK: Packt Publishing Ltd, 2024.
Harvard Citation (style guide)Bouhdada, J. (2024). Securing industrial control systems and safety instrumented systems: a practical guide for safeguarding mission and safety critical systems. Birmingham, UK: Packt Publishing Ltd.
MLA Citation, 9th Edition (style guide)Bouhdada, Jalal. Securing Industrial Control Systems and Safety Instrumented Systems: A Practical Guide for Safeguarding Mission and Safety Critical Systems Packt Publishing Ltd., 2024.
Staff View
Grouping Information
Grouped Work ID | c6a769b8-70f6-63f1-93fb-d040950e557b-eng |
---|---|
Full title | securing industrial control systems and safety instrumented systems a practical guide for safeguarding mission and safety critical systems |
Author | bouhdada jalal |
Grouping Category | book |
Last Update | 2025-02-05 03:31:38AM |
Last Indexed | 2025-05-03 03:32:36AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Feb 24, 2025 |
Last Used | Feb 24, 2025 |
Marc Record
First Detected | Dec 16, 2024 11:30:26 PM |
---|---|
Last File Modification Time | Dec 17, 2024 08:39:28 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 05353cam a22004697a 4500 | ||
---|---|---|---|
001 | on1451100519 | ||
003 | OCoLC | ||
005 | 20241217082833.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 240807s2024 enk o 000 0 eng d | ||
019 | |a 1451076031 | ||
020 | |a 9781801071864|q (electronic bk.) | ||
020 | |a 1801071861|q (electronic bk.) | ||
035 | |a (OCoLC)1451100519|z (OCoLC)1451076031 | ||
037 | |a 9781801078818|b O'Reilly Media | ||
037 | |a 10769223|b IEEE | ||
040 | |a YDX|b eng|c YDX|d OCLCO|d ORMDA|d OCLCO|d OCLKB|d EBLCP|d IEEEE | ||
049 | |a MAIN | ||
050 | 4 | |a TS156.8 | |
082 | 0 | 4 | |a 670.42/7|2 23/eng/20240903 |
100 | 1 | |a Bouhdada, Jalal,|e author. | |
245 | 1 | 0 | |a Securing industrial control systems and safety instrumented systems|h [electronic resource] :|b a practical guide for safeguarding mission and safety critical systems /|c Jalal Bouhdada. |
260 | |a Birmingham, UK :|b Packt Publishing Ltd.,|c 2024. | ||
300 | |a 1 online resource | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- Dedications -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Safety Instrumented Systems -- Chapter 1: Introduction to Safety Instrumented Systems (SISs) -- Understanding SIS -- SIS elements -- BPCS versus SIS -- SIS applications -- where are they used? -- What is ICS cybersecurity? -- How do IT and engineering communities perceive ICS cybersecurity? -- Exploring relevant cybersecurity and functional safety standards -- Examining the safety and cybersecurity lifecycle -- Safety lifecycle -- Cybersecurity lifecycle | |
505 | 8 | |a SIS secure architecture -- Managing entry points -- Example SIS reference architectures -- Safety network protocols -- HART -- Modbus -- OPC -- SafeEthernet (HIMA) -- Vnet/IP (Yokogawa) -- ProfiSafe -- Functional Safety Over EtherCAT (FSoE) -- CIP Safety -- CC-Link Safety -- openSAFETY -- ICS proprietary protocols -- Lab exercise -- TRITON -- Summary -- Further reading -- Part 2: Attacking and Securing SISs -- Chapter 4: Hacking Safety Instrumented Systems -- ICS attacks -- Process (physical) attacks -- Cyber attacks -- Understanding the SIS attack surface -- SuCs -- Abusing the HMI | |
505 | 8 | |a Attacking the SIS controller -- (P)0wning the S-EWS -- Abusing the IAMS -- Replaying traffic -- Reverse engineering a transmitter of field devices -- Bypassing a key switch -- Putting it all together -- Lab exercise -- ReeR MOSAIC M1S safety PLC security assessment -- Summary -- Further reading -- Chapter 5: Securing Safety Instrumented Systems -- Security design and engineering -- The secure-by-design principle -- Managing the ICS cybersecurity lifecycle -- Technology and product selection -- CSMSs -- SIS -- The need for integral security -- Operational policies and procedures -- GOM | |
505 | 8 | |a Operation and cybersecurity maintenance -- Hazard -- Criticality -- Reliability -- Summary -- Further reading -- Part 3: Risk Management and Compliance -- Chapter 6: Cybersecurity Risk Management of SISs -- Importance of cyber risk assessment -- Risk assessment objectives -- SIS risk assessment principles -- Consequence-based risk assessment -- Cybersecurity risk assessment methodologies -- Conducting risk assessments in SISs -- IEC 62443-3-2 -- BowTie -- NAMUR -- The continuous nature of risk assessment -- Summary -- Further reading -- Chapter 7: Security Standards and Certification | |
520 | |a As modern process facilities become increasingly sophisticated and vulnerable to cyber threats, securing critical infrastructure is more crucial than ever. This book offers an indispensable guide to industrial cybersecurity and Safety Instrumented Systems (SIS), vital for maintaining the safety and reliability of critical systems and protecting your operations, personnel, and assets. Starting with SIS design principles, the book delves into the architecture and protocols of safety networks. It provides hands-on experience identifying vulnerabilities and potential attack vectors, exploring how attackers might target SIS components. You'll thoroughly analyze Key SIS technologies, threat modeling, and attack techniques targeting SIS controllers and engineer workstations. The book shows you how to secure Instrument Asset Management Systems (IAMS), implement physical security measures, and apply integrated risk management methodologies. It also covers compliance with emerging cybersecurity regulations and industry standards worldwide. By the end of the book, you'll have gained practical insights into various risk assessment methodologies and a comprehensive understanding of how to effectively protect critical infrastructure. | ||
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Process control|x Security measures. | |
650 | 0 | |a Computer security.|9 65527 | |
776 | 0 | 8 | |i Print version:|z 1801078815|z 9781801078818|w (OCoLC)1399562888 |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781801078818/?ar|x O'Reilly|z eBook |
938 | |a YBP Library Services|b YANK|n 306576172 | ||
938 | |b OCKB|z netlibrary.ebooks,8efad4a7-e1e8-4a78-8442-8fbbd50629de-emi | ||
994 | |a 92|b VIA | ||
999 | |c 361205|d 361205 |