000 04197nam a22006255i 4500
001 978-3-030-18214-4
003 DE-He213
005 20240423125119.0
007 cr nn 008mamaa
008 190829s2019 sz | s |||| 0|eng d
020 _a9783030182144
_9978-3-030-18214-4
024 7 _a10.1007/978-3-030-18214-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aIndustrial Control Systems Security and Resiliency
_h[electronic resource] :
_bPractice and Theory /
_cedited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aX, 276 p. 98 illus., 81 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x2512-2193 ;
_v75
505 0 _a1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience.
520 _aThis book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Suchresilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aTelecommunication.
650 0 _aArtificial intelligence.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aArtificial Intelligence.
700 1 _aRieger, Craig.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRay, Indrajit.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aZhu, Quanyan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aHaney, Michael A.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030182137
776 0 8 _iPrinted edition:
_z9783030182151
776 0 8 _iPrinted edition:
_z9783030182168
830 0 _aAdvances in Information Security,
_x2512-2193 ;
_v75
856 4 0 _uhttps://doi.org/10.1007/978-3-030-18214-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c174385
_d174385