語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Industrial Control Systems Security ...
~
Rieger, Craig.
Industrial Control Systems Security and Resiliency = Practice and Theory /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Industrial Control Systems Security and Resiliency/ edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney.
其他題名:
Practice and Theory /
其他作者:
Rieger, Craig.
面頁冊數:
X, 276 p. 98 illus., 81 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-3-030-18214-4
ISBN:
9783030182144
Industrial Control Systems Security and Resiliency = Practice and Theory /
Industrial Control Systems Security and Resiliency
Practice and Theory /[electronic resource] :edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney. - 1st ed. 2019. - X, 276 p. 98 illus., 81 illus. in color.online resource. - Advances in Information Security,751568-2633 ;. - Advances in Information Security,.
1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience.
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
ISBN: 9783030182144
Standard No.: 10.1007/978-3-030-18214-4doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Industrial Control Systems Security and Resiliency = Practice and Theory /
LDR
:03287nam a22004095i 4500
001
1010111
003
DE-He213
005
20200703074158.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030182144
$9
978-3-030-18214-4
024
7
$a
10.1007/978-3-030-18214-4
$2
doi
035
$a
978-3-030-18214-4
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Industrial Control Systems Security and Resiliency
$h
[electronic resource] :
$b
Practice and Theory /
$c
edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
X, 276 p. 98 illus., 81 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Information Security,
$x
1568-2633 ;
$v
75
505
0
$a
1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience.
520
$a
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Rieger, Craig.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1304147
700
1
$a
Ray, Indrajit.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
682166
700
1
$a
Zhu, Quanyan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1114545
700
1
$a
Haney, Michael A.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1304148
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030182137
776
0 8
$i
Printed edition:
$z
9783030182151
776
0 8
$i
Printed edition:
$z
9783030182168
830
0
$a
Advances in Information Security,
$x
1568-2633
$3
1256774
856
4 0
$u
https://doi.org/10.1007/978-3-030-18214-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入