Industrial Cybersecurity

Your one-step guide to understanding industrial cyber security, its control systems, and its operations.
Preview in Mapt

Industrial Cybersecurity

Pascal Ackerman

Your one-step guide to understanding industrial cyber security, its control systems, and its operations.
Mapt Subscription
FREE
$29.99/m after trial
eBook
$18.00
RRP $35.99
Save 49%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$18.00
$44.99
$29.99 p/m after trial
RRP $35.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


Industrial Cybersecurity Book Cover
Industrial Cybersecurity
$ 35.99
$ 18.00
Cybersecurity – Attack and Defense Strategies Book Cover
Cybersecurity – Attack and Defense Strategies
$ 31.99
$ 16.00
Buy 2 for $33.50
Save $34.48
Add to Cart

Book Details

ISBN 139781788395151
Paperback456 pages

Book Description

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

Table of Contents

Chapter 1: Industrial Control Systems
An overview of an Industrial control system
The Industrial control system architecture
The Purdue model for Industrial control systems
Industrial control system communication media and protocols
Summary
Chapter 2: Insecure by Inheritance
Industrial control system history
Modbus and Modbus TCP/IP
PROFINET
Common IT protocols found in the ICS
Summary
Chapter 3: Anatomy of an ICS Attack Scenario
Setting the stage
The Slumbertown paper mill
Trouble in paradise
What can the attacker do with their access?
The cyber kill chain
Phase two of the Slumbertown Mill ICS attack
Other attack scenarios
Summary
Chapter 4: Industrial Control System Risk Assessment
Attacks, objectives, and consequences
Risk assessments
A risk assessment example
Summary
Chapter 5: The Purdue Model and a Converged Plantwide Ethernet
The Purdue Enterprise Reference Architecture
Summary
Chapter 6: The Defense-in-depth Model
ICS security restrictions
How to go about defending an ICS?
The ICS is extremely defendable
The defense-in-depth model
Summary
Chapter 7: Physical ICS Security
The ICS security bubble analogy
Segregation exercise
Down to it – Physical security
Summary
Chapter 8: ICS Network Security
Designing network architectures for security
Summary
Chapter 9: ICS Computer Security
Endpoint hardening
Configuration and change management
Patch management
Endpoint protection software
Summary
Chapter 10: ICS Application Security
Application security
Application security testing
ICS application patching
ICS secure SDLC
Summary
Chapter 11: ICS Device Security
ICS device hardening
ICS device patching
The ICS device life cycle
Summary
Chapter 12: The ICS Cybersecurity Program Development Process
The NIST Guide to Industrial control systems  security
The ICS security program development process
Summary

What You Will Learn

  • Understand industrial cybersecurity, its control systems and operations
  • Design security-oriented architectures, network segmentation, and security support services
  • Configure event monitoring systems, anti-malware applications, and endpoint security
  • Gain knowledge of ICS risks, threat detection, and access management
  • Learn about patch management and life cycle management
  • Secure your industrial control systems from design through retirement

Authors

Table of Contents

Chapter 1: Industrial Control Systems
An overview of an Industrial control system
The Industrial control system architecture
The Purdue model for Industrial control systems
Industrial control system communication media and protocols
Summary
Chapter 2: Insecure by Inheritance
Industrial control system history
Modbus and Modbus TCP/IP
PROFINET
Common IT protocols found in the ICS
Summary
Chapter 3: Anatomy of an ICS Attack Scenario
Setting the stage
The Slumbertown paper mill
Trouble in paradise
What can the attacker do with their access?
The cyber kill chain
Phase two of the Slumbertown Mill ICS attack
Other attack scenarios
Summary
Chapter 4: Industrial Control System Risk Assessment
Attacks, objectives, and consequences
Risk assessments
A risk assessment example
Summary
Chapter 5: The Purdue Model and a Converged Plantwide Ethernet
The Purdue Enterprise Reference Architecture
Summary
Chapter 6: The Defense-in-depth Model
ICS security restrictions
How to go about defending an ICS?
The ICS is extremely defendable
The defense-in-depth model
Summary
Chapter 7: Physical ICS Security
The ICS security bubble analogy
Segregation exercise
Down to it – Physical security
Summary
Chapter 8: ICS Network Security
Designing network architectures for security
Summary
Chapter 9: ICS Computer Security
Endpoint hardening
Configuration and change management
Patch management
Endpoint protection software
Summary
Chapter 10: ICS Application Security
Application security
Application security testing
ICS application patching
ICS secure SDLC
Summary
Chapter 11: ICS Device Security
ICS device hardening
ICS device patching
The ICS device life cycle
Summary
Chapter 12: The ICS Cybersecurity Program Development Process
The NIST Guide to Industrial control systems  security
The ICS security program development process
Summary

Book Details

ISBN 139781788395151
Paperback456 pages
Read More

Read More Reviews

Recommended for You

Cybersecurity – Attack and Defense Strategies Book Cover
Cybersecurity – Attack and Defense Strategies
$ 31.99
$ 16.00
Information Security Handbook Book Cover
Information Security Handbook
$ 35.99
$ 18.00
Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition Book Cover
Kali Linux Wireless Penetration Testing Beginner’s Guide - Third Edition
$ 27.99
$ 14.00
Wireshark Revealed: Essential Skills for IT Professionals Book Cover
Wireshark Revealed: Essential Skills for IT Professionals
$ 79.99
$ 40.00
Digital Forensics with Kali Linux Book Cover
Digital Forensics with Kali Linux
$ 31.99
$ 16.00
Metasploit Revealed: Secrets of the Expert Pentester Book Cover
Metasploit Revealed: Secrets of the Expert Pentester
$ 71.99
$ 36.00