Industrial network security: securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems
Gespeichert in:
Hauptverfasser: | , |
---|---|
Weitere Verfasser: | |
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier / Syngress
2015
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xix, 439 Seiten Illustrationen, Diagramme |
ISBN: | 9780124201149 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042288320 | ||
003 | DE-604 | ||
005 | 20221013 | ||
007 | t | ||
008 | 150123s2015 xxua||| |||| 00||| eng d | ||
020 | |a 9780124201149 |c pbk. |9 978-0-12-420114-9 | ||
035 | |a (OCoLC)900755057 | ||
035 | |a (DE-599)BVBBV042288320 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-473 |a DE-523 |a DE-573 |a DE-Aug4 | ||
082 | 0 | |a 670.42/7 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Knapp, Eric D. |e Verfasser |0 (DE-588)1124809031 |4 aut | |
245 | 1 | 0 | |a Industrial network security |b securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems |c Eric D. Knapp, Joel Thomas Langill ; Technical editor Ray Samani |
250 | |a Second edition | ||
264 | 1 | |a Amsterdam [u.a.] |b Elsevier / Syngress |c 2015 | |
300 | |a xix, 439 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Corporate Network |0 (DE-588)4402944-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a SCADA |g Programm |0 (DE-588)4571010-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Corporate Network |0 (DE-588)4402944-5 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |D s |
689 | 0 | 3 | |a SCADA |g Programm |0 (DE-588)4571010-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Langill, Joel Thomas |e Verfasser |0 (DE-588)1124810013 |4 aut | |
700 | 1 | |a Samani, Raj |4 edt | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027725540&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027725540 |
Datensatz im Suchindex
_version_ | 1804152857482493952 |
---|---|
adam_text | Contents
About the Authors
....................................................................................................xv
Pret ace
....................................................................................................................xvii
Acknowledgments
...................................................................................................xix
CHAPTER
1
Introduction
.................................................................................
ι
Book Overview and Key Learning Points
.............................................1
Book Audience
.......................................................................................2
Diagrams and Figures
............................................................................2
The Smart Grid
......................................................................................3
How This Book is Organized
.................................................................3
Chapter
2:
About Industrial Networks
............................................3
Chapter
3:
Industrial Cyber Security, History, and Trends
............4
Chapter
4:
Introduction to
ICS
and Operations
..............................4
Chapter
5:
ICS
Network Design and Architecture
.........................4
Chapter
6:
Industrial Network Protocols
........................................4
Chapter
7:
Hacking Industrial Systems
..........................................5
Chapter X: Risk and Vulnerability Assessments
.............................5
Chapter
9:
Establishing Zones and Conduits
..................................5
Chapter
10:
Implementing Security and Access Controls
..............5
Chapter I
1:
Exception. Anomaly, and Threat Detection
................5
Chapter
12:
Security Monitoring of Industrial Control
Systems
...........................................................................................
ft
Chapter
13:
Standards and Regulations
..........................................
ft
Changes Made to the Second Edition
.............................................
ft
Conclusion
.............................................................................................7
CHAPTER
2
About Industrial Networks
.....................................................9
The Lrse
oľTerminology
Within This Book
..........................................
У
Attacks. Breaches, and Incidents:
Malware.
Exploits, and APTs
.......................................................
I I
Assets. Critical Assets, Cyber Assets.
and Critical Cyber Assets
.....................................
Security Controls and Security Counlermcasures
Firewalls and Intrusion Prevention Systems
.........
Industrial Control System
.....................................
DCS or
SCADA?....
Industrial Networks
vi
Contents
Industrial
Protocols
.......................................................................15
Networks, Routable Networks, and Nonroutable Networks
........18
Enterprise
or
Business Networks
..................................................20
Zones and Enclaves
......................................................................22
Network Perimeters or
Electronic
Security Perimeters
............24
Critical infrastructure
....................................................................26
Common Industrial Security Recommendations
.................................29
Identification of Critical Systems
.................................................29
Network Segmentation/Isolation of Systems
................................31
Defense in Depth
..........................................................................33
Access Control
..............................................................................34
Advanced Industrial Security Recommendations
................................35
Security Monitoring
......................................................................36
Policy Whitelisling
.......................................................................36
Application Whitelisting
...............................................................36
Common Mispcrceptions About
industrial Network Security
.................................................................37
Assumptions Made in This Book
.................................................38
Summary
..............................................................................................39
Endnotes...............................................................................................39
CHAPTER
3
Industrial Cyber Security History
and Trends
__________________________________41
Importance of Securing Industrial Networks
.......................................41
The Evolution of the Cyber Threat
......................................................44
APTs and Wcaponized
Malware..................................................47
Slili
to Come
.................................................................................50
Defending Against Modern Cyber Threats
...................................51
Insider Threats
.....................................................................................52
Hacktivism. Cyber Crime. Cyber Terrorism, and Cyber War
.............53
Summary
.......................................................... 55
Emlnotes
.......................................................... 55
CHAPTER
4
Introduction to Industrial Control Systems
and Operations
________________ 59
System Assets
............................................ 50.
Programmable Logic Controller
...................................................59
Remote Terminal Unit
............................................
6З
Intelligent Electronic Device
........................................................
jy
Human-Machine Interface
....................................... 64
Contents
vii
Supervisory Workstations
.............................................................67
Data Historian
...............................................................................67
Business Information Consoles and Dashboards
..........................68
Other Assets
..................................................................................69
System Operations
...............................................................................70
Control Loops
...............................................................................70
Control Processes
..........................................................................72
Feedback Loops
............................................................................73
Production Information Management
...........................................73
Business Information Management
..............................................74
Process Management
...........................................................................76
Safety Instrumented Systems
...............................................................
7S
The Smart Grid
....................................................................................80
Network Architectures
.........................................................................82
Summary
..............................................................................................82
Kndnotes
...............................................................................................83
CHAPTER
5
Industrial Network Design and Architecture
.................85
Introduction to Industrial Networking
.................................................87
Common Topologies
............................................................................92
Network Segmentation
.........................................................................96
Higher Layer Segmentation
..........................................................99
Physical vs. Logical Segmentation
.............................................
KM
Network Services
...............................................................................106
Wireless Networks
.............................................................................107
Remote Access
...................................................................................108
Performance Considerations
.
Latency and Jitter
...........
Bandwidth and Throughput
................................................
Type of Service. Class of Service, and Quality of Service.
Network Hops
.....................................................................
Network Security Controls
.................................................
Safety Instrumented Systems.
Special Considerations
...........
Wide Area Connectivity
.
Smart Grid Network Considerations
Advanced Metering Infrastructure...
Summary
I ind notes.
II
I!
12
13
13
14
15
15
16
IK
19
19
viii Contents
CHAPTER
6
Industrial Network Protocols
............................................121
Overview of Industrial Network Protocols
........................................121
Fieldbus Protocols
..............................................................................123
Modicon Communication Bus
....................................................123
Distributed Network Protocol
.....................................................130
Process Fieldbus
.........................................................................139
Industrial Ethernet Protocols
......................................................141
Ethernet Industrial Protocol
........................................................142
PROFÍNÉT
.................................................................................146
EtherCAT
....................................................................................147
Ethernet
POWERLINK..............................................................148
SERCOSIII
................................................................................149
Backend Protocols
.............................................................................150
Open Process Communications
..................................................150
Inter-Control Center Communications Protocol
........................157
Advanced Metering Infrastructure and the Smart Grid
.....................162
Security Concerns
.......................................................................164
Security Recommendations
........................................................164
Industrial Protocol Simulators
...........................................................164
Modbus
.......................................................................................165
DNP3
/
IEC
60870-5..................................................................165
OPC
.............................................................................................165
ICCP/IEC
60870-6
(TASE.2)
...................................................165
Physical Hardware
......................................................................166
Summary
............................................................................................166
Endnotcs
.............................................................................................
J66
CHAPTER
7
Hacking Industrial Control Systems
_____________
m
Motives and Consequences
................................................................17
1
Consequences of a Successful Cyber Incident
...........................171
Cyber Security and Safely
..........................................................172
Common Industrial Targets
...............................................................174
Common Attack Methods
..................................................................186
Man-in-lhc-Middlc Attacks
........................................................186
Denial-of-
Serv
ice Attacks
..........................................................187
Replay Attacks
............................................................................188
Compromising the Human-Machine Interface
..........................189
Compromising the Engineering Workstation
.............................189
Blended Attacks
..........................................................................190
Contents ix
Examples
ol Weaponized Industrial Cyber
Threats
..........................190
Stuxnct
........................................................................................191
Shamoon/DistTrack....................................................................195
Flame/Flamer/Sky wiper
.............................................................195
Attack Trends
.....................................................................................196
Evolving Vulnerabilities: The Adobe Exploits
...........................197
Industrial Application Layer Attacks
..........................................198
Antisocial Networks: A New Playground for
Malware.............
2(K)
Dealing with an Infection
...................................................................203
Summary
............................................................................................205
Endnotes.............................................................................................206
CHAPTER
8
Risk and Vulnerability Assessments
..............................209
Cyber Security and Risk Management
..............................................210
Why Risk Management is the Foundation
ol Cyber Security
........................................................................210
What is Risk?
..............................................................................211
Standards and Best Practices for Risk Management
..................213
Methodologies lor Assessing Risk Within Industrial
Control Systems
.................................................................................216
Security Tests
..............................................................................216
Establishing a Testing and Assessment Methodology
................219
System Characterization
....................................................................223
Data Collection
...........................................................................227
Scanning ol Industrial Networks
................................................228
Threat Identification
...........................................................................241
Threat Actors/Sources
................................................................241
Threat Vectors
............................................................................243
Threat Events
..............................................................................243
Identification of Threats During Security Assessments
..............244
Vulnerability Identification
................................................................246
Vulnerability Scanning
...............................................................
24S
Configuration Auditing
...............................................................250
Vulnerability Prioritization
.........................................................251
Risk Classification and Ranking
........................................................253
Consequences and Impact
...........................................................253
How to Estimate Consequences and Likelihood
........................254
Risk Ranking
..............................................................................256
Risk Reduction and Mitigation
..........................................................257
Summan
............................................................................................
25H
Endnotes.............................................................................................259
Contents
CHAPTER
9
Establishing Zones and Conduits
....................................261
Security Zones and Conduits Explained
............................................263
Identifying and Classifying Security Zones and Conduits
................264
Recommended Security Zone Separation
..........................................265
Network Connectivity
.................................................................266
Control Loops
.............................................................................267
Supervisory Controls
..................................................................268
Plant Level Control Processes
....................................................268
Control Datastorage
..................................................................270
Trading Communications
...........................................................271
Remote Access
............................................................................272
Users and Roles
..........................................................................272
Protocols
.....................................................................................274
Criticality
....................................................................................275
Establishing Security Zones and Conduits
........................................277
Summary
............................................................................................279
Endnotes.............................................................................................280
CHAPTER
10
Implementing Security
and Access Controls
............................................................283
Network Segmentation
.......................................................................287
Zones and Security Policy Development
....................................288
Using Zones within Security Device Configurations
.................288
Implementing Network Security Controls
.........................................290
Selecting Network Security Devices
..........................................290
Implementing Network Security Devices
...................................293
Implementing Host Security and Access Controls
............................309
Selecting Host Cyber Security Systems
.....................................31
1
External Controls
........................................................................316
Patch Management
......................................................................316
How Much Security is Enough?
........................................................320
Summary
............................................................................................321
Endnotcs
.............................................................................................321
CHAPTER
11
Exception, Anomaly, and Threat Detection
________323
Exception Reporting
..........................................................................324
Behavioral Anomaly Detection
..........................................................326
Measuring Baselines
...................................................................327
Anomaly Detection
.....................................................................330
Behavioral Whitelisting
.....................................................................333
User Whitelists
............................................................................334
Contents xi
Asset Whitelists
..........................................................................335
Application
Behavior
Whitelists.................................................337
Threat Detection
.................................................................................340
Event
Correlation
........................................................................341
Correlating Between IT and
ОТ
Systems
...................................347
Summary
............................................................................................349
Endnotes.............................................................................................349
CHAPTER
12
Security Monitoring of Industrial
Control Systems
.....................................................................351
Determining what to Monitor
............................................................352
Security Events
...........................................................................353
Assets
..........................................................................................356
Configurations
.............................................................................
35S
Applications
................................................................................360
Networks
.....................................................................................361
User Identities and Authentication
.............................................362
Additional Context
......................................................................365
Behavior
......................................................................................365
Successfully Monitoring Security /ones
...........................................367
Log Collection
............................................................................368
Direct Monitoring
.......................................................................368
Inferred Monitoring
....................................................................369
Information Collection and Management Tools
.........................372
Monitoring Across Secure Boundaries
.......................................376
Information Management
...................................................................376
Queries
........................................................................................377
Reports
........................................................................................379
Alerts
...........................................................................................3X1
Incident Investigation and Response
..........................................3X1
Log Storage and Retention
.................................................................3X2
Nonrepudiation
...........................................................................3X2
Data Retention/Storage
...............................................................3X2
Data Availability
.........................................................................3X4
Summary
............................................................................................3X5
Endnotes.............................................................................................3X5
CHAPTER
13
Standards and Regulations
................................................387
Common Standards and Regulations
.................................................
3XX
NERC
CIP..................................................................................
3X9
СЕЛТЅ
........................................................................................3X9
xii Contents
ISO/IEC 27002...........................................................................390
NRC Regulation 5.71..................................................................390
NISTSP 800-82..........................................................................392
ISA/IEC-62443..................................................................................392
ISA 62443 Group 1: General ..................................................392
ISA 62443 Group 2:
Policies
and Procedures
.........................393
ISA 62443 Group 3: System ...................................................393
ISA 62443 Group 4:
Component
............................................394
Mapping Industrial
Network
Security to Compliance
.......................395
Industry Best Practices for Conducting
ICS
Assessments
.................395
Department of Homeland Security (USA)
/
Centre for Protection of National Infrastructure (UK)
...............396
National Security Agency (USA)
...............................................397
American Petroleum Institute (USA)
/
National
Petrochemical and Refiners Association (USA)
.........................397
Institute for Security and Open Methodologies (Spain)
.............398
Common Criteria and FIPS Standards
...............................................398
Common Criteria
........................................................................398
FIPS I4O-2..................................................................................400
Summary
............................................................................................400
Endnotes.............................................................................................406
Appendix A Protocol Resources
_____________________________409
Modbus Organization
.........................................................................409
DNP3 Users Group
............................................................................409
OPC Foundation
.................................................................................410
Common Industrial Protocol
(CIP)
/
Open Device
Vendor Association (ODVA)
............................................................410
PROFIBUS
&
PROHNĚT
International (PI)
....................................410
Appendix
В
Standards Organizations
----------------------------------------411
North American Reliability Corporation
(NERC)
.............................411
The United Slates Nuclear Regulatory
Commission (NRC)
...................................................... 41
1
NRC
Tille
I0CFR
73.54..............................................
Щ І4І2
NRC RG
5.71..............................................................
ZZZ.All
United States Department of Homeland Security
..............................412
Chemical Facilities Ami-Terrorism Standard (CFATS)
.............412
CFATS Risk-Based Performance Standards (RBPS)
.................412
International Society of Automation (ISA)
...................................„ ...413
International Organization for Standardization (ISO)
and International Electrotechnical Commission (IEC)
...413
Contents xiii
Appendix
С
NIST
Security Guidelines
...................................................4i5
National
Institute of
Standards and Technology.
Publications
H(X)
Series
.........................................................415
Glossary...................................................................................
417
Endnotes.............................................................................................424
Index........................................................................................425
|
any_adam_object | 1 |
author | Knapp, Eric D. Langill, Joel Thomas |
author2 | Samani, Raj |
author2_role | edt |
author2_variant | r s rs |
author_GND | (DE-588)1124809031 (DE-588)1124810013 |
author_facet | Knapp, Eric D. Langill, Joel Thomas Samani, Raj |
author_role | aut aut |
author_sort | Knapp, Eric D. |
author_variant | e d k ed edk j t l jt jtl |
building | Verbundindex |
bvnumber | BV042288320 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)900755057 (DE-599)BVBBV042288320 |
dewey-full | 670.42/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 670 - Manufacturing |
dewey-raw | 670.42/7 |
dewey-search | 670.42/7 |
dewey-sort | 3670.42 17 |
dewey-tens | 670 - Manufacturing |
discipline | Informatik Werkstoffwissenschaften / Fertigungstechnik |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01991nam a2200445zc 4500</leader><controlfield tag="001">BV042288320</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221013 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150123s2015 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124201149</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-0-12-420114-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900755057</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042288320</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">670.42/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knapp, Eric D.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1124809031</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Industrial network security</subfield><subfield code="b">securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems</subfield><subfield code="c">Eric D. Knapp, Joel Thomas Langill ; Technical editor Ray Samani</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier / Syngress</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xix, 439 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Corporate Network</subfield><subfield code="0">(DE-588)4402944-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SCADA</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4571010-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Corporate Network</subfield><subfield code="0">(DE-588)4402944-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">SCADA</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4571010-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Langill, Joel Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1124810013</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samani, Raj</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027725540&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027725540</subfield></datafield></record></collection> |
id | DE-604.BV042288320 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:17:22Z |
institution | BVB |
isbn | 9780124201149 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027725540 |
oclc_num | 900755057 |
open_access_boolean | |
owner | DE-1050 DE-473 DE-BY-UBG DE-523 DE-573 DE-Aug4 |
owner_facet | DE-1050 DE-473 DE-BY-UBG DE-523 DE-573 DE-Aug4 |
physical | xix, 439 Seiten Illustrationen, Diagramme |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Elsevier / Syngress |
record_format | marc |
spelling | Knapp, Eric D. Verfasser (DE-588)1124809031 aut Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems Eric D. Knapp, Joel Thomas Langill ; Technical editor Ray Samani Second edition Amsterdam [u.a.] Elsevier / Syngress 2015 xix, 439 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Intelligentes Stromnetz (DE-588)7708028-2 gnd rswk-swf Corporate Network (DE-588)4402944-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf SCADA Programm (DE-588)4571010-7 gnd rswk-swf Corporate Network (DE-588)4402944-5 s Computersicherheit (DE-588)4274324-2 s Intelligentes Stromnetz (DE-588)7708028-2 s SCADA Programm (DE-588)4571010-7 s DE-604 Langill, Joel Thomas Verfasser (DE-588)1124810013 aut Samani, Raj edt Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027725540&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Knapp, Eric D. Langill, Joel Thomas Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems Intelligentes Stromnetz (DE-588)7708028-2 gnd Corporate Network (DE-588)4402944-5 gnd Computersicherheit (DE-588)4274324-2 gnd SCADA Programm (DE-588)4571010-7 gnd |
subject_GND | (DE-588)7708028-2 (DE-588)4402944-5 (DE-588)4274324-2 (DE-588)4571010-7 |
title | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems |
title_auth | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems |
title_exact_search | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems |
title_full | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems Eric D. Knapp, Joel Thomas Langill ; Technical editor Ray Samani |
title_fullStr | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems Eric D. Knapp, Joel Thomas Langill ; Technical editor Ray Samani |
title_full_unstemmed | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems Eric D. Knapp, Joel Thomas Langill ; Technical editor Ray Samani |
title_short | Industrial network security |
title_sort | industrial network security securing critical infrastructure networks for smart grid scada and other industrial control systems |
title_sub | securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems |
topic | Intelligentes Stromnetz (DE-588)7708028-2 gnd Corporate Network (DE-588)4402944-5 gnd Computersicherheit (DE-588)4274324-2 gnd SCADA Programm (DE-588)4571010-7 gnd |
topic_facet | Intelligentes Stromnetz Corporate Network Computersicherheit SCADA Programm |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027725540&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT knappericd industrialnetworksecuritysecuringcriticalinfrastructurenetworksforsmartgridscadaandotherindustrialcontrolsystems AT langilljoelthomas industrialnetworksecuritysecuringcriticalinfrastructurenetworksforsmartgridscadaandotherindustrialcontrolsystems AT samaniraj industrialnetworksecuritysecuringcriticalinfrastructurenetworksforsmartgridscadaandotherindustrialcontrolsystems |