Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and other Industrial Control Systems

  • 6h 24m
  • Eric Knapp
  • Elsevier Science and Technology Books, Inc.
  • 2011

For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection. While covering compliance guidelines, attacks and vectors, and even evolving security tools, this book gives you a clear understanding of SCADA and Control System protocols and how they operate.

  • Covers implementation guidelines for security measures of critical infrastructure
  • Applies the security measures for system-specific compliance
  • Discusses common pitfalls and mistakes and how to avoid them

About the Author

Eric D. Knapp is the Director of Critical Infrastructure Markets for NitroSecurity, where he leads the identification, evaluation, and implementation of new security technologies specific to the protection of critical infrastructure, Supervisory Control And Data Acquisition (SCADA), and industrial control networks.

Eric has 20 years of experience in Information Technology, specializing in industrial automation technologies, infrastructure security, and applied Ethernet protocols as well as the design and implementation of Intrusion Prevention Systems and Security Information and Event Management systems in both enterprise and industrial networks. In addition to his work in information security, Eric is an award-winning author. He studied English and Writing at the University of New Hampshire and the University of London and holds a degree in communications.

In this Book

  • Foreword
  • Introduction
  • About Industrial Networks
  • Introduction to Industrial Network Security
  • Industrial Network Protocols
  • How Industrial Networks Operate
  • Vulnerability and Risk Assessment
  • Establishing Secure Enclaves
  • Exception, Anomaly, and Threat Detection
  • Monitoring Enclaves
  • Standards and Regulations
  • Common Pitfalls and Mistakes
  • Glossary
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.7 of 90 users Rating 4.7 of 90 users (90)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)