Securing industrial control systems and safety instrumented systems a practical guide for safeguarding mission and safety critical systems

Book Cover
Average Rating
Published
Birmingham, UK : Packt Publishing Ltd., 2024.
Status
Available Online

Description

Loading Description...

More Details

Format
Language
English
ISBN
9781801071864, 1801071861

Notes

Description
As modern process facilities become increasingly sophisticated and vulnerable to cyber threats, securing critical infrastructure is more crucial than ever. This book offers an indispensable guide to industrial cybersecurity and Safety Instrumented Systems (SIS), vital for maintaining the safety and reliability of critical systems and protecting your operations, personnel, and assets. Starting with SIS design principles, the book delves into the architecture and protocols of safety networks. It provides hands-on experience identifying vulnerabilities and potential attack vectors, exploring how attackers might target SIS components. You'll thoroughly analyze Key SIS technologies, threat modeling, and attack techniques targeting SIS controllers and engineer workstations. The book shows you how to secure Instrument Asset Management Systems (IAMS), implement physical security measures, and apply integrated risk management methodologies. It also covers compliance with emerging cybersecurity regulations and industry standards worldwide. By the end of the book, you'll have gained practical insights into various risk assessment methodologies and a comprehensive understanding of how to effectively protect critical infrastructure.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Table of Contents

Cover
Title Page
Copyright and Credits
Dedications
Foreword
Contributors
Table of Contents
Preface
Part 1: Safety Instrumented Systems
Chapter 1: Introduction to Safety Instrumented Systems (SISs)
Understanding SIS
SIS elements
BPCS versus SIS
SIS applications
where are they used?
What is ICS cybersecurity?
How do IT and engineering communities perceive ICS cybersecurity?
Exploring relevant cybersecurity and functional safety standards
Examining the safety and cybersecurity lifecycle
Safety lifecycle
Cybersecurity lifecycle
SIS secure architecture
Managing entry points
Example SIS reference architectures
Safety network protocols
HART
Modbus
OPC
SafeEthernet (HIMA)
Vnet/IP (Yokogawa)
ProfiSafe
Functional Safety Over EtherCAT (FSoE)
CIP Safety
CC-Link Safety
openSAFETY
ICS proprietary protocols
Lab exercise
TRITON
Summary
Further reading
Part 2: Attacking and Securing SISs
Chapter 4: Hacking Safety Instrumented Systems
ICS attacks
Process (physical) attacks
Cyber attacks
Understanding the SIS attack surface
SuCs
Abusing the HMI
Attacking the SIS controller
(P)0wning the S-EWS
Abusing the IAMS
Replaying traffic
Reverse engineering a transmitter of field devices
Bypassing a key switch
Putting it all together
Lab exercise
ReeR MOSAIC M1S safety PLC security assessment
Summary
Further reading
Chapter 5: Securing Safety Instrumented Systems
Security design and engineering
The secure-by-design principle
Managing the ICS cybersecurity lifecycle
Technology and product selection
CSMSs
SIS
The need for integral security
Operational policies and procedures
GOM
Operation and cybersecurity maintenance
Hazard
Criticality
Reliability
Summary
Further reading
Part 3: Risk Management and Compliance
Chapter 6: Cybersecurity Risk Management of SISs
Importance of cyber risk assessment
Risk assessment objectives
SIS risk assessment principles
Consequence-based risk assessment
Cybersecurity risk assessment methodologies
Conducting risk assessments in SISs
IEC 62443-3-2
BowTie
NAMUR
The continuous nature of risk assessment
Summary
Further reading
Chapter 7: Security Standards and Certification

Discover More

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Bouhdada, J. (2024). Securing industrial control systems and safety instrumented systems: a practical guide for safeguarding mission and safety critical systems . Packt Publishing Ltd..

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Bouhdada, Jalal. 2024. Securing Industrial Control Systems and Safety Instrumented Systems: A Practical Guide for Safeguarding Mission and Safety Critical Systems. Birmingham, UK: Packt Publishing Ltd.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Bouhdada, Jalal. Securing Industrial Control Systems and Safety Instrumented Systems: A Practical Guide for Safeguarding Mission and Safety Critical Systems Birmingham, UK: Packt Publishing Ltd, 2024.

Harvard Citation (style guide)

Bouhdada, J. (2024). Securing industrial control systems and safety instrumented systems: a practical guide for safeguarding mission and safety critical systems. Birmingham, UK: Packt Publishing Ltd.

MLA Citation, 9th Edition (style guide)

Bouhdada, Jalal. Securing Industrial Control Systems and Safety Instrumented Systems: A Practical Guide for Safeguarding Mission and Safety Critical Systems Packt Publishing Ltd., 2024.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
c6a769b8-70f6-63f1-93fb-d040950e557b-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work IDc6a769b8-70f6-63f1-93fb-d040950e557b-eng
Full titlesecuring industrial control systems and safety instrumented systems a practical guide for safeguarding mission and safety critical systems
Authorbouhdada jalal
Grouping Categorybook
Last Update2025-02-05 03:31:38AM
Last Indexed2025-05-03 03:32:36AM

Book Cover Information

Image Sourcedefault
First LoadedFeb 24, 2025
Last UsedFeb 24, 2025

Marc Record

First DetectedDec 16, 2024 11:30:26 PM
Last File Modification TimeDec 17, 2024 08:39:28 AM
SuppressedRecord had no items

MARC Record

LEADER05353cam a22004697a 4500
001on1451100519
003OCoLC
00520241217082833.0
006m     o  d        
007cr |n|||||||||
008240807s2024    enk     o     000 0 eng d
019 |a 1451076031
020 |a 9781801071864|q (electronic bk.)
020 |a 1801071861|q (electronic bk.)
035 |a (OCoLC)1451100519|z (OCoLC)1451076031
037 |a 9781801078818|b O'Reilly Media
037 |a 10769223|b IEEE
040 |a YDX|b eng|c YDX|d OCLCO|d ORMDA|d OCLCO|d OCLKB|d EBLCP|d IEEEE
049 |a MAIN
050 4|a TS156.8
08204|a 670.42/7|2 23/eng/20240903
1001 |a Bouhdada, Jalal,|e author.
24510|a Securing industrial control systems and safety instrumented systems|h [electronic resource] :|b a practical guide for safeguarding mission and safety critical systems /|c Jalal Bouhdada.
260 |a Birmingham, UK :|b Packt Publishing Ltd.,|c 2024.
300 |a 1 online resource
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
5050 |a Cover -- Title Page -- Copyright and Credits -- Dedications -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Safety Instrumented Systems -- Chapter 1: Introduction to Safety Instrumented Systems (SISs) -- Understanding SIS -- SIS elements -- BPCS versus SIS -- SIS applications -- where are they used? -- What is ICS cybersecurity? -- How do IT and engineering communities perceive ICS cybersecurity? -- Exploring relevant cybersecurity and functional safety standards -- Examining the safety and cybersecurity lifecycle -- Safety lifecycle -- Cybersecurity lifecycle
5058 |a SIS secure architecture -- Managing entry points -- Example SIS reference architectures -- Safety network protocols -- HART -- Modbus -- OPC -- SafeEthernet (HIMA) -- Vnet/IP (Yokogawa) -- ProfiSafe -- Functional Safety Over EtherCAT (FSoE) -- CIP Safety -- CC-Link Safety -- openSAFETY -- ICS proprietary protocols -- Lab exercise -- TRITON -- Summary -- Further reading -- Part 2: Attacking and Securing SISs -- Chapter 4: Hacking Safety Instrumented Systems -- ICS attacks -- Process (physical) attacks -- Cyber attacks -- Understanding the SIS attack surface -- SuCs -- Abusing the HMI
5058 |a Attacking the SIS controller -- (P)0wning the S-EWS -- Abusing the IAMS -- Replaying traffic -- Reverse engineering a transmitter of field devices -- Bypassing a key switch -- Putting it all together -- Lab exercise -- ReeR MOSAIC M1S safety PLC security assessment -- Summary -- Further reading -- Chapter 5: Securing Safety Instrumented Systems -- Security design and engineering -- The secure-by-design principle -- Managing the ICS cybersecurity lifecycle -- Technology and product selection -- CSMSs -- SIS -- The need for integral security -- Operational policies and procedures -- GOM
5058 |a Operation and cybersecurity maintenance -- Hazard -- Criticality -- Reliability -- Summary -- Further reading -- Part 3: Risk Management and Compliance -- Chapter 6: Cybersecurity Risk Management of SISs -- Importance of cyber risk assessment -- Risk assessment objectives -- SIS risk assessment principles -- Consequence-based risk assessment -- Cybersecurity risk assessment methodologies -- Conducting risk assessments in SISs -- IEC 62443-3-2 -- BowTie -- NAMUR -- The continuous nature of risk assessment -- Summary -- Further reading -- Chapter 7: Security Standards and Certification
520 |a As modern process facilities become increasingly sophisticated and vulnerable to cyber threats, securing critical infrastructure is more crucial than ever. This book offers an indispensable guide to industrial cybersecurity and Safety Instrumented Systems (SIS), vital for maintaining the safety and reliability of critical systems and protecting your operations, personnel, and assets. Starting with SIS design principles, the book delves into the architecture and protocols of safety networks. It provides hands-on experience identifying vulnerabilities and potential attack vectors, exploring how attackers might target SIS components. You'll thoroughly analyze Key SIS technologies, threat modeling, and attack techniques targeting SIS controllers and engineer workstations. The book shows you how to secure Instrument Asset Management Systems (IAMS), implement physical security measures, and apply integrated risk management methodologies. It also covers compliance with emerging cybersecurity regulations and industry standards worldwide. By the end of the book, you'll have gained practical insights into various risk assessment methodologies and a comprehensive understanding of how to effectively protect critical infrastructure.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Process control|x Security measures.
650 0|a Computer security.|9 65527
77608|i Print version:|z 1801078815|z 9781801078818|w (OCoLC)1399562888
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781801078818/?ar|x O'Reilly|z eBook
938 |a YBP Library Services|b YANK|n 306576172
938 |b OCKB|z netlibrary.ebooks,8efad4a7-e1e8-4a78-8442-8fbbd50629de-emi
994 |a 92|b VIA
999 |c 361205|d 361205