Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Industrial Control Systems Security ...
~
Rieger, Craig.
Industrial Control Systems Security and Resiliency = Practice and Theory /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Industrial Control Systems Security and Resiliency/ edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney.
Reminder of title:
Practice and Theory /
other author:
Rieger, Craig.
Description:
X, 276 p. 98 illus., 81 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-3-030-18214-4
ISBN:
9783030182144
Industrial Control Systems Security and Resiliency = Practice and Theory /
Industrial Control Systems Security and Resiliency
Practice and Theory /[electronic resource] :edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney. - 1st ed. 2019. - X, 276 p. 98 illus., 81 illus. in color.online resource. - Advances in Information Security,751568-2633 ;. - Advances in Information Security,.
1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience.
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
ISBN: 9783030182144
Standard No.: 10.1007/978-3-030-18214-4doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Industrial Control Systems Security and Resiliency = Practice and Theory /
LDR
:03287nam a22004095i 4500
001
1010111
003
DE-He213
005
20200703074158.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030182144
$9
978-3-030-18214-4
024
7
$a
10.1007/978-3-030-18214-4
$2
doi
035
$a
978-3-030-18214-4
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Industrial Control Systems Security and Resiliency
$h
[electronic resource] :
$b
Practice and Theory /
$c
edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
X, 276 p. 98 illus., 81 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Information Security,
$x
1568-2633 ;
$v
75
505
0
$a
1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience.
520
$a
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Rieger, Craig.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1304147
700
1
$a
Ray, Indrajit.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
682166
700
1
$a
Zhu, Quanyan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1114545
700
1
$a
Haney, Michael A.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1304148
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030182137
776
0 8
$i
Printed edition:
$z
9783030182151
776
0 8
$i
Printed edition:
$z
9783030182168
830
0
$a
Advances in Information Security,
$x
1568-2633
$3
1256774
856
4 0
$u
https://doi.org/10.1007/978-3-030-18214-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login