You are previewing Securing Critical Infrastructures and Critical Control Systems.
O'Reilly logo
Securing Critical Infrastructures and Critical Control Systems

Book Description

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Preface
  6. Acknowledgment
  7. Chapter 1: Security Threats and Risks of Intelligent Building Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. WHAT ARE INTELLIGENT BUILDING SYSTEMS?
    5. ARCHITECTURE OF INTELLIGENT BUILDING SYSTEMS
    6. INTELLIGENT BUILDING VULNERABILITIES
    7. PROTECTING THE INTELLIGENT BUILDING
    8. FUTURE VULNERABILITIES OF INTELLIGENT BUILDINGS
    9. FUTURE RESEARCH DIRECTIONS
    10. CONCLUSION
  8. Chapter 2: Detecting Cyber Attacks on SCADA and Other Critical Infrastructures
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
  9. Chapter 3: Proactive Security Protection of Critical Infrastructure
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. SECURITY, RISK, THREAT AND VULNERABILITY ASSESSMENT (SRTVA) PROCESS
    5. THE ROLE OF INTELLIGENCE
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
  10. Chapter 4: Industrial Control Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. THE HUMAN COMPLICATION
    4. SOLUTIONS AND RECOMMENDATIONS
    5. CONCLUSION
  11. Chapter 5: ENISA Study
    1. ABSTRACT
    2. INTRODUCTION
    3. ENISA STUDY
    4. DESKTOP RESEARCH RESULTS
    5. SURVEY ANALYSIS RESULTS: KEY FINDINGS
    6. ENISA SEVEN RECOMMENDATIONS FOR THE ICS PROTECTION
    7. CONCLUSION
  12. Chapter 6: Distributed Monitoring
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DISTRIBUTED MONITORING FOR SCADA SYSTEMS
    5. SMART GRID
    6. DATA ACQUISITION FROM THE SENSORS
    7. FUTURE RESEARCH DIRECTIONS
    8. CONCLUSION
  13. Chapter 7: Motivating Cybersecurity
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. CRITICAL INFRASTRUCTURE AS AN OBJECT OF CYBER THREATS, PAST AND PRESENT
    5. DISCUSSION AND FUTURE RESEARCH
    6. CONCLUSION
  14. Chapter 8: Patching our Critical Infrastructure
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. FUTURE RESEARCH DIRECTIONS
    5. CONCLUSION
  15. Chapter 9: ICS Software Protection
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. ADDRESSING THE PROBLEM SPACE
    5. SITUATIONAL AWARENESS
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
  16. Chapter 10: A Community-Oriented Approach to CIIP in Developing Countries
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DEVELOPING WORLD INFORMATION INFRASTRUCTURE PROTECTION
    5. COMMUNITY-ORIENTED SECURITY, ADVISORY, AND WARNING
    6. SERVICES
    7. CONCLUSION
  17. Chapter 11: Designing a Security Audit Plan for a Critical Information Infrastructure (CII)
    1. ABSTRACT
    2. SCENE SETTING
    3. 1. CONTEXT: CIIS IN 2012
    4. 2. REVIEW OF SIGNIFICANT CII SECURITY EVENTS IN THE LAST FEW YEARS
    5. 3. BRIEF REVIEW OF RELATED LITERATURE
    6. 4. SECURITY ANATOMY OF A CII
    7. 5. BRIEF REVIEW OF INFORMATION SECURITY STANDARDS AND GOOD PRACTICES
    8. 6. ASSESSING SECURITY PERFORMANCE
    9. 8. AUDITING THE GOVERNANCE AND MANAGEMENT OF INFORMATION SECURITY AT A CII
    10. 9. NARROWING THE SCOPE OF AUDIT AT A CII
    11. 10. AUDIT REPORTING
    12. 11. DISCUSSION: ASSUMPTIONS MADE IN THE PREPARATION OF THIS CHAPTER
    13. 12. CONCLUSION
    14. APPENDIX 1: ONLINE RESOURCES RELATING TO THE PROTECTION AND AUDIT OF CRITICAL INFORMATION INFRASTRUCTURES
    15. APPENDIX 2: INFORMATION REQUIREMENTS TO DEFINE THE SCOPE OF AN INFORMATION SECURITY AUDIT
  18. Chapter 12: Safety and Security in SCADA Systems Must be Improved through Resilience Based Risk Management
    1. ABSTRACT
    2. 1. INTRODUCTION: SAFETY AND SECURITY MUST BE IMPROVED
    3. 2. DESCRIPTION OF A FRAMEWORK TO MANAGE SAFETY AND SECURITY
    4. 3. HOW TO EXAMINE THE PRACTICAL USE OF EXISTING GUIDELINES
    5. 4. THE USE OF THE GUIDELINES AND IMPACT ON SAFETY AND SECURITY
    6. 5. DISCUSSION OF THE IMPACT AND FUTURE IMPROVEMENTS
  19. Chapter 13: Fortifying Large Scale, Geospatial Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. PROTECTION PLANNING
    5. APPLICATION RESULTS
    6. DISCUSSION
    7. IMPLICATIONS FOR SCADA
    8. CONCLUSION
  20. Chapter 14: Information Sharing for CIP
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. EXISTING INFORMATION SHARING MECHANISMS
    5. ECONOMIC DRIVERS AFFECTING PARTICIPATION IN INFORMATION SHARING
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
  21. Chapter 15: Intrusion Detection and Resilient Control for SCADA Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. 2 PROPOSED SCADA-SPECIFIC INTRUSION DETECTION/PREVENTION SYSTEMS
    4. 3 COMPARISON OF PROPOSED SYSTEMS
    5. 4 EVALUATION OF PROPOSED SYSTEMS
    6. 5 BACKGROUND ON HYPOTHESIS TESTING
    7. 6 PROBLEM STATEMENT
    8. 7 RESILIENT ESTIMATION
    9. 8 ROBUST OUTLIER DETECTION
    10. 9 EXPERIMENTS AND EVALUATION
    11. 10 CONCLUSION AND FUTURE DIRECTIONS
  22. Compilation of References
  23. About the Contributors