Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Front Cover
CRC Press, Apr 19, 2016 - Business & Economics - 203 pages
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and im
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

AUTHORS
What Is an Industrial Control System?
ICS Compared to Safety Instrumented
THREATSTO
Malware
ICS VULNERABILITIES
An Ironic Comment on PERA
RISK ASSESSMENT TECHNIQUES
Assessment
WHAT IS NEXTIN ICS SECURITY?
ICS v6 Test Lab Designs
Test Environment
Private Architecture and Cellular
IPv6 and ICS Sensors
Endnotes
Security Assurance Level

INL National SCADA Test Bed Program

Other editions - View all

Common terms and phrases

About the author (2016)

Tyson Macaulay is the security liaison officer (SLO) for Bell Canada. In this role, he is responsible for technical and operational risk management solutions for Bell's largest enterprise clients. Macaulay leads security initiatives addressing large, complex, technology solutions including physical and logical (IT) assets, and regulatory/legal compliance requirements. He supports engagements involving multinational companies and international governments.

Macaulay also supports the development of engineering and security standards through the Professional Engineers of Ontario and the International Standards Organization (ISO) SC 27 Committee. Macaulay leadership encompasses a broad range of industry sectors from the defense industry to high-tech start-ups. His expertise includes operational risk management programs, technical services, and incident management processes. He has successfully served as prime architect for large-scale security implementations in both public and private sector institutions, working on projects from conception through development to implementation. Macaulay is a respected thought leader with publications dating from 1993. His work has covered authorship of peer-reviewed white papers, IT security governance programs, technical and integration services, and incident management processes. Further information on Macaulay publications and practice areas can be found online at: www.tysonmacaulay.com.

Previously, Macaulay served as director of risk management for a U.S. defense contractor in Ottawa, Electronic Warfare Associates (EWA; 2001-2005), and founded General Network Services (GNS; 1996-2001). Macaulay career began as a research consultant for the Federal Department of Communications (DoC) on information networks, where he helped develop the first generation of Internet services for the DoC in the 1990s.

Bryan L. Singer, CISM, CISSP, CAP, is principal consultant for Kenexis Cons

Bibliographic information