語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Protecting ICS Systems Within the En...
~
ProQuest Information and Learning Co.
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Protecting ICS Systems Within the Energy Sector from Cyber Attacks./
作者:
Barnes, Shaquille.
面頁冊數:
1 online resource (58 pages)
附註:
Source: Masters Abstracts International, Volume: 57-01.
標題:
Information technology. -
電子資源:
click for full text (PQDT)
ISBN:
9780355495362
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
Barnes, Shaquille.
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
- 1 online resource (58 pages)
Source: Masters Abstracts International, Volume: 57-01.
Thesis (M.S.)--Utica College, 2017.
Includes bibliographical references
Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355495362Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
LDR
:02412ntm a2200337K 4500
001
912593
005
20180608112134.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355495362
035
$a
(MiAaPQ)AAI10681712
035
$a
(MiAaPQ)utica:11094
035
$a
AAI10681712
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Barnes, Shaquille.
$3
1185029
245
1 0
$a
Protecting ICS Systems Within the Energy Sector from Cyber Attacks.
264
0
$c
2017
300
$a
1 online resource (58 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 57-01.
500
$a
Adviser: Christopher Riddell.
502
$a
Thesis (M.S.)--Utica College, 2017.
504
$a
Includes bibliographical references
520
$a
Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
650
4
$a
Energy.
$3
784773
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0984
690
$a
0791
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10681712
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入