SUSTAINABLE DEVELOPMENT
Innovate. Sustain. Transform.
Save up to 30% on top Physical Sciences & Engineering titles!

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the… Read more
SUSTAINABLE DEVELOPMENT
Save up to 30% on top Physical Sciences & Engineering titles!
Lead Author
Contributors
Foreword Contributor
Foreword Contributor
Foreword
Chapter 1. Physical Security: SCADA and the Critical Infrastructure’s Biggest Vulnerability
Introduction
Summary
Solutions Fast Track
Frequently Asked Questions (and Special Interviews)
Chapter 2. Supervisory Control and Data Acquisition
Introduction
Just What Is SCADA?
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3. SCADA Security Assessment Methodology
Introduction
Why Do Assessments on SCADA Systems?
Information Protection Requirements
An Approach to SCADA Information Security Assessments
Pre-Project Activities
Pre-Assessment Activities
On-Site Assessment Activities
Post Assessment Activities
Resources
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4. Developing an Effective Security Awareness Program
Introduction
Why an Information Security Awareness Program Is Important
How to Design an Effective Information Security Awareness Program
How to Implement an Information Security Awareness Program
How Do You Keep Your Program a Successful Component of Your Company’s Mindset?
How to Measure Your Program
Summary
Solutions Fast Track
Chapter 5. Working with Law Enforcement on SCADA Incidents
Introduction
SCADA System Overview
Secure Network Management
Managing Security Events
Examples of Common Attack Techniques
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6. Locked but Not Secure: An Overview of Conventional and High Security Locks
Introduction
Conventional Pin Tumbler Locks
Standards for Conventional and High Security Locks
The Concept of Security
Security Vulnerabilities of Conventional Locks: Why High Security Locks Are Supposed to Offer More Protection Against Methods of Entry
Covert Entry Techniques: Manipulation of Internal Locking Components
High Security to High Insecurity: Real World Attacks
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7. Bomb Threat Planning: Things Have Changed
Introduction
The Day Our World Changed
Insider Information: Where Do These Guys Get This Stuff?
The Terrorist Profile
Potential Terror Targets
What Should I Be Looking For?
Searching: What Am I Looking For and Where?
Evacuation Plans
Summary
Chapter 8. Biometric Authentication for SCADA Security
Introduction
Understanding Biometric Systems and How They Are Best Used for SCADA Security
Choosing the Best Form of Measurement for Your System
Where are Biometric Authentication Regimes Vulnerable?
Anticipating Legal and Policy Changes That Will Affect Biometrics
Summary
Solutions Fast Track
Frequently Asked Questions
Appendix. Personal, Workforce, and Family Preparedness
Introduction
Threats
Your Personal Preparedness Plan
The Escape Pack
Workforce Preparedness
Steps for Successful Workforce Preparedness
Get Out, Get Away, and Get in Touch
Family Preparedness Plan
Preparedness Pantry
Water
Cooking
Testing Your Home Preparedness Plan
Family Ready Kit
No Lights? No Problem!
Emergency Power
Staying in Touch
Summary
Index
GM
JW
TC
PD
PH
LJ
SL
MT
JW