Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Protecting ICS Systems Within the En...
~
ProQuest Information and Learning Co.
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
Protecting ICS Systems Within the Energy Sector from Cyber Attacks./
Author:
Barnes, Shaquille.
Description:
1 online resource (58 pages)
Notes:
Source: Masters Abstracts International, Volume: 57-01.
Subject:
Information technology. -
Online resource:
click for full text (PQDT)
ISBN:
9780355495362
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
Barnes, Shaquille.
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
- 1 online resource (58 pages)
Source: Masters Abstracts International, Volume: 57-01.
Thesis (M.S.)--Utica College, 2017.
Includes bibliographical references
Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355495362Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
LDR
:02412ntm a2200337K 4500
001
912593
005
20180608112134.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355495362
035
$a
(MiAaPQ)AAI10681712
035
$a
(MiAaPQ)utica:11094
035
$a
AAI10681712
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Barnes, Shaquille.
$3
1185029
245
1 0
$a
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
264
0
$c
2017
300
$a
1 online resource (58 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 57-01.
500
$a
Adviser: Christopher Riddell.
502
$a
Thesis (M.S.)--Utica College, 2017.
504
$a
Includes bibliographical references
520
$a
Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
650
4
$a
Energy.
$3
784773
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0984
690
$a
0791
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10681712
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login