Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) - Recommendations of the (Paperback)
Loot Price: R648
Discovery Miles 6 480
|
|
Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) - Recommendations of the (Paperback)
Expected to ship within 10 - 15 working days
|
NIST Special Publication 800-82. This document provides guidance
for establishing secure industrial control systems (ICS). These
ICS, which include supervisory control and data acquisition (SCADA)
systems, distributed control systems (DCS), and other control
system configurations such as skid-mounted Programmable Logic
Controllers (PLC) are often found in the industrial control
sectors. ICS are typically used in industries such as electric,
water and wastewater, oil and natural gas, transportation,
chemical, pharmaceutical, pulp and paper, food and beverage, and
discrete manufacturing (e.g., automotive, aerospace, and durable
goods.) SCADA systems are generally used to control dispersed
assets using centralized data acquisition and supervisory control.
DCS are generally used to control production systems within a local
area such as a factory using supervisory and regulatory control.
PLCs are generally used for discrete control for specific
applications and generally provide regulatory control. These
control systems are vital to the operation of the U.S. critical
infrastructures that are often highly interconnected and mutually
dependent systems. It is important to note that approximately 90
percent of the nation's critical infrastructures are privately
owned and operated. Federal agencies also operate many of the ICS
mentioned above; other examples include air traffic control and
materials handling (e.g., Postal Service mail handling.) This
document provides an overview of these ICS and typical system
topologies, identifies typical threats and vulnerabilities to these
systems, and provides recommended security countermeasures to
mitigate the associated risks. National Institute of Standards and
Technology. U.S. Department of Commerce.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.