Industrial Network Security
Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
- 3rd Edition - March 26, 2024
- Author: Eric D. Knapp
- Language: English
- Paperback ISBN:9 7 8 - 0 - 4 4 3 - 1 3 7 3 7 - 2
- eBook ISBN:9 7 8 - 0 - 4 4 3 - 1 3 7 3 8 - 9
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more im… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteAs the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.
Author Eric Knapp examines the unique protocols and applications that are the foundation of Industrial Control Systems (ICS) and provides clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
- All-new real-world examples of attacks against control systems such as Trisis, Industroyer, Incontroller, and more
- New information on Risk Management to better address cyber-physical systems and the risks associated with cyber-physical attacks
- Includes all-new content on OT attack methodology, USB security, OT Cyber Kill Chains, Incident Response lifecycles, and more
- Provides improved guidance for implementing security controls and risk mitigation strategies, including expanded coverage of network segmentation, monitoring, and threat detection
- Includes new coverage of network spans, mirrors, and taps, as well as asset discovery, log collection, and industrial-focused SIEM solution
Information security professionals, Computer Science analysts, consultants, and researchers in academia and industry. Electrical Control System operators, SCADA system operators, and IT professionals in the following verticals: electricity, water, gas, chemical, oil, and smart grid. DoE and NIST staff, policy makers, and people working on the corporate side of power companies and utilities.
- Cover image
- Title page
- Table of Contents
- Copyright
- Biography
- Acknowledgments
- 1. Introduction
- Book overview and key learning points
- Book audience
- Diagrams and figures
- The smart grid
- OT, IoT, IIoT, and xIoT
- How this book is organized
- Changes made to the third edition
- Conclusion
- 2. About Industrial Networks
- The use of terminology within this book
- Critical infrastructure
- Understanding “OT” versus “IT”
- Common Industrial Security Recommendations
- Common Misperceptions About Industrial Network Security
- Assumptions made in this book
- Summary
- 3. Industrial Cybersecurity History and Trends
- The convergence of OT and IT
- Importance of securing industrial networks
- The evolution of the cyber threat
- Defending against modern cyber threats
- Summary
- 4. Introduction to Industrial Control Systems and Operations
- System assets
- System operations
- Process management
- Safety instrumented systems
- The smart grid
- Network architectures
- Summary
- 5. Industrial Network Design and Architecture
- Introduction to industrial networking
- Common topologies
- Network segmentation
- Network services
- Wireless networks
- Remote access
- Performance considerations
- Safety instrumented systems
- Special considerations
- Summary
- 6. Industrial Network Protocols
- Overview of industrial network protocols
- Fieldbus protocols
- Industrial ethernet protocols
- Backend protocols
- Summary
- 7. Hacking Industrial Control Systems
- Motives and consequences
- Common industrial targets
- The evolution of the industrial cyberattack
- Weaponized industrial cyberthreats
- Attack trends
- Summary
- 8. Risk and Vulnerability Assessments
- Cybersecurity and risk management
- Methodologies for assessing risk within industrial control systems
- System characterization
- Threat identification
- Vulnerability identification
- Risk classification and ranking
- Cyber-physical threat modeling
- Cybersecurity HAZOP
- Risk reduction and mitigation
- Summary
- 9. Establishing Zones and Conduits
- Security zones and conduits explained
- Identifying and classifying security zones and conduits
- Recommended security zone separation
- Establishing security zones and conduits
- Creating a zone and conduit map
- Summary
- 10. OT Attack and Defense Lifecycles
- Attack lifecycles and kill chains
- Defense lifecycles
- The importance of understanding lifecycles
- Summary
- 11. Implementing Security and Access Controls
- Network segmentation
- Implementing network security controls
- Implementing host security and access controls
- Malware detection methods
- From theory to practice
- Summary
- 12. Exception, Anomaly, and Threat Detection
- Exception reporting
- Behavioral anomaly detection
- Behavioral whitelisting
- Advanced threat detection
- Summary
- 13. Security Monitoring of Industrial Control Systems
- Determining what to monitor
- Information management
- Log storage and retention
- Summary
- 14. Standards and Regulations
- Common standards and regulations
- ISA/IEC-62443
- Mapping industrial network security to compliance
- Industry best practices for conducting ICS assessments
- Common Criteria and FIPS standards
- Summary
- 15. Common Pitfalls and Mistakes
- The basics
- Lack of proper operationalization
- Lack of awareness
- Misunderstanding vulnerability
- Worlds are colliding!
- The mistake that you are making right now
- Summary
- Glossary
- Index
- No. of pages: 518
- Language: English
- Edition: 3
- Published: March 26, 2024
- Imprint: Syngress
- Paperback ISBN: 9780443137372
- eBook ISBN: 9780443137389
EK