Free eBook: Industrial Cybersecurity

Industrial Cybersecurity
Your one-step guide to understanding industrial cyber security, its control systems, and its operations.

Pascal Ackerman, 456 pages, Oct 2017

Key Features

  • Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
  • Filled with practical examples to help you secure critical infrastructure systems efficiently
  • A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems


With ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equipped with techniques to ward off all kinds of cyber threat.

Register now to access this free eBook

Your password must have at least 8 characters, one uppercase, one lowercase and one number.

By signing up, you are confirming you would like to receive occasional emails about special offers and recommendations.


Chapter 1


Industrial Control Systems

Understand what an Industrial control system is, what it does, and what parts make up an ICS. Learn about some of the common communication protocols and media used to interconnect the parts of an ICS.

Chapter 2


Insecure by Inheritance

Deep dive into a select set of technologies that can be found in most Industrial controls systems and examine some of the vulnerabilities or weaknesses that these technologies have. Covering PROFINET, EtherNet/IP, Common Industrial protocol, Ethernet and Modbus TCP/IP.

Chapter 3


Anatomy of an ICS Attack Scenario

In this chapter, we are going to look at a possible attack scenario on an Industrial control system (ICS). The ICS in question controls the process of a paper mill. We will follow along with the activities of the paper mill staff as the attack and infiltration progresses, and along the way, detai...

Chapter 4


Industrial Control System Risk Assessment

Overview of how hacker techniques like these are used for good as well, within risk assessments. Build a good understanding of what is involved with conducting a variety of ICS-related risk assessment activities.

Chapter 5


The Purdue Model and a Converged Plantwide Ethernet

Take a closer look at the Purdue Enterprise Reference Architecture (PERA), or Purdue model for short. The Purdue model is an industry best practice and a widely adopted concept model for ICS network segmentation and is used extensively to explain ICS architectures.

Chapter 6


The Defense-in-depth Model

In this chapter we will we discuss the methodology behind securing an ICS with a layered defense approach, the defense-in-depth model. You will learn the concepts creating a holistic ICS security posture by stacking our defenses, or in other words, by creating multiple backup security controls th...

Related Titles

Building Blockchain Projects

Develop real-time practical DApps using Ethereum and JavaScript

Hands-On Cybersecurity for Architects

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Cybersecurity - Attack and Defense Strategies

Enhance your organization's secure posture by improving your attack and defense strategies

Discover the new Packt free eBook range