Protecting industrial control systems from electronic threats:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Momentum Press
©2010
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes bibliographical references and index "Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations |
Beschreibung: | 1 Online-Ressource (ix, 327 pages) |
ISBN: | 9781606501993 1606501992 9781606501979 1606501976 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042967037 | ||
003 | DE-604 | ||
005 | 20160105 | ||
007 | cr|uuu---uuuuu | ||
008 | 151030s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781606501993 |c electronic bk. |9 978-1-60650-199-3 | ||
020 | |a 1606501992 |c electronic bk. |9 1-60650-199-2 | ||
020 | |a 9781606501979 |9 978-1-60650-197-9 | ||
020 | |a 1606501976 |9 1-60650-197-6 | ||
020 | |a 1606501992 |9 1-60650-199-2 | ||
020 | |a 1606501976 |9 1-60650-197-6 | ||
035 | |a (OCoLC)670428503 | ||
035 | |a (DE-599)BVBBV042967037 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
082 | 0 | |a 658.05 |2 22 | |
100 | 1 | |a Weiss, Joseph |e Verfasser |4 aut | |
245 | 1 | 0 | |a Protecting industrial control systems from electronic threats |c Joseph Weiss |
250 | |a 1st ed | ||
264 | 1 | |a New York |b Momentum Press |c ©2010 | |
300 | |a 1 Online-Ressource (ix, 327 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a "Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page | ||
500 | |a Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501137 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBU |a ZDB-4-NLEBK | ||
940 | 1 | |q FLA_PDA_EBU | |
940 | 1 | |q TUM_EBSCO_PDA | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028392904 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804175293936566272 |
---|---|
any_adam_object | |
author | Weiss, Joseph |
author_facet | Weiss, Joseph |
author_role | aut |
author_sort | Weiss, Joseph |
author_variant | j w jw |
building | Verbundindex |
bvnumber | BV042967037 |
collection | ZDB-4-EBU ZDB-4-NLEBK |
ctrlnum | (OCoLC)670428503 (DE-599)BVBBV042967037 |
dewey-full | 658.05 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.05 |
dewey-search | 658.05 |
dewey-sort | 3658.05 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03576nmm a2200565zc 4500</leader><controlfield tag="001">BV042967037</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606501993</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-60650-199-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606501992</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-60650-199-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606501979</subfield><subfield code="9">978-1-60650-197-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606501976</subfield><subfield code="9">1-60650-197-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606501992</subfield><subfield code="9">1-60650-199-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606501976</subfield><subfield code="9">1-60650-197-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)670428503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042967037</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.05</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weiss, Joseph</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting industrial control systems from electronic threats</subfield><subfield code="c">Joseph Weiss</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Momentum Press</subfield><subfield code="c">©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (ix, 327 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501137</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">TUM_EBSCO_PDA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028392904</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042967037 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:14:00Z |
institution | BVB |
isbn | 9781606501993 1606501992 9781606501979 1606501976 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028392904 |
oclc_num | 670428503 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (ix, 327 pages) |
psigel | ZDB-4-EBU ZDB-4-NLEBK FLA_PDA_EBU TUM_EBSCO_PDA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Momentum Press |
record_format | marc |
spelling | Weiss, Joseph Verfasser aut Protecting industrial control systems from electronic threats Joseph Weiss 1st ed New York Momentum Press ©2010 1 Online-Ressource (ix, 327 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index "Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations Computer networks / Security measures BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Computer networks / Security measures fast Wirtschaft Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501137 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Weiss, Joseph Protecting industrial control systems from electronic threats Computer networks / Security measures BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Computer networks / Security measures fast Wirtschaft Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Protecting industrial control systems from electronic threats |
title_auth | Protecting industrial control systems from electronic threats |
title_exact_search | Protecting industrial control systems from electronic threats |
title_full | Protecting industrial control systems from electronic threats Joseph Weiss |
title_fullStr | Protecting industrial control systems from electronic threats Joseph Weiss |
title_full_unstemmed | Protecting industrial control systems from electronic threats Joseph Weiss |
title_short | Protecting industrial control systems from electronic threats |
title_sort | protecting industrial control systems from electronic threats |
topic | Computer networks / Security measures BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Computer networks / Security measures fast Wirtschaft Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks / Security measures BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Wirtschaft Computer networks Security measures Computersicherheit |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501137 |
work_keys_str_mv | AT weissjoseph protectingindustrialcontrolsystemsfromelectronicthreats |