0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) - Recommendations of the (Paperback) Loot Price: R648
Discovery Miles 6 480
Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed...

Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) - Recommendations of the (Paperback)

Joe Falco, Karen Scarfone, Keith Stouffer

 (sign in to rate)
Loot Price R648 Discovery Miles 6 480 | Repayment Terms: R61 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) are often found in the industrial control sectors. ICS are typically used in industries such as electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control. DCS are generally used to control production systems within a local area such as a factory using supervisory and regulatory control. PLCs are generally used for discrete control for specific applications and generally provide regulatory control. These control systems are vital to the operation of the U.S. critical infrastructures that are often highly interconnected and mutually dependent systems. It is important to note that approximately 90 percent of the nation's critical infrastructures are privately owned and operated. Federal agencies also operate many of the ICS mentioned above; other examples include air traffic control and materials handling (e.g., Postal Service mail handling.) This document provides an overview of these ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks. National Institute of Standards and Technology. U.S. Department of Commerce.

General

Imprint: Createspace Independent Publishing Platform
Country of origin: United States
Release date: June 2011
First published: June 2011
Authors: Joe Falco • Karen Scarfone • Keith Stouffer
Dimensions: 279 x 216 x 8mm (L x W x T)
Format: Paperback - Trade
Pages: 156
ISBN-13: 978-1-4750-2279-7
Categories: Books > Computing & IT > Computer communications & networking > Network security
LSN: 1-4750-2279-4
Barcode: 9781475022797

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners