Free eBook: Industrial Cybersecurity
Pascal Ackerman, 456 pages, Oct 2017
- Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
- Filled with practical examples to help you secure critical infrastructure systems efficiently
- A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems
DescriptionWith ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equipped with techniques to ward off all kinds of cyber threat.
Register now to access this free eBook
Industrial Control Systems
Understand what an Industrial control system is, what it does, and what parts make up an ICS. Learn about some of the common communication protocols and media used to interconnect the parts of an ICS.
Insecure by Inheritance
Deep dive into a select set of technologies that can be found in most Industrial controls systems and examine some of the vulnerabilities or weaknesses that these technologies have. Covering PROFINET, EtherNet/IP, Common Industrial protocol, Ethernet and Modbus TCP/IP.
Anatomy of an ICS Attack Scenario
In this chapter, we are going to look at a possible attack scenario on an Industrial control system (ICS). The ICS in question controls the process of a paper mill. We will follow along with the activities of the paper mill staff as the attack and infiltration progresses, and along the way, detai...
Industrial Control System Risk Assessment
Overview of how hacker techniques like these are used for good as well, within risk assessments. Build a good understanding of what is involved with conducting a variety of ICS-related risk assessment activities.
The Purdue Model and a Converged Plantwide Ethernet
Take a closer look at the Purdue Enterprise Reference Architecture (PERA), or Purdue model for short. The Purdue model is an industry best practice and a widely adopted concept model for ICS network segmentation and is used extensively to explain ICS architectures.
The Defense-in-depth Model
In this chapter we will we discuss the methodology behind securing an ICS with a layered defense approach, the defense-in-depth model. You will learn the concepts creating a holistic ICS security posture by stacking our defenses, or in other words, by creating multiple backup security controls th...
Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization
Enhance your organization's secure posture by improving your attack and defense strategies