It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-028.mrc:61430237:9232
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-028.mrc:61430237:9232?format=raw

LEADER: 09232cam a2200601Ia 4500
001 13598689
005 20220521224250.0
006 m o d
007 cr cn|||||||||
008 110727s2006 okua o 001 0 eng d
010 $a 2006013261
035 $a(OCoLC)ocn743006497
035 $a(NNC)13598689
040 $aKNOVL$beng$epn$cKNOVL$dOCLCQ$dDEBSZ$dZCU$dOCLCQ$dKNOVL$dE7B$dOCLCF$dOCLCQ$dSTF$dVT2$dOCLCQ$dOCLCA$dBUF$dREB$dCEF$dRRP$dCOO$dAU@$dWYU$dOCLCO
019 $a646849523$a961883003$a988653754$a999408541$a1026426893$a1058075563$a1065647482
020 $a9781615839773$q(electronic bk.)
020 $a1615839771$q(electronic bk.)
020 $z1593700687$q(hardcover)
020 $z9781593700683$q(hardcover)
035 $a(OCoLC)743006497$z(OCoLC)646849523$z(OCoLC)961883003$z(OCoLC)988653754$z(OCoLC)999408541$z(OCoLC)1026426893$z(OCoLC)1058075563$z(OCoLC)1065647482
037 $bKnovel Corporation$nhttp://www.knovel.com
050 4 $aTJ222$b.S53 2006eb
082 04 $a620/.46028558$222
049 $aZCUA
100 1 $aShaw, William T.
245 10 $aCybersecurity for SCADA systems /$cWilliam T. Shaw.
260 $aTulsa, Okla. :$bPennWell Corp.,$c©2006.
300 $a1 online resource (xviii, 562 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
588 0 $aPrint version record.
505 00 $aMachine derived contents note: Contents -- Preface -- Acknowledgments -- Introduction -- Industrial Automation in the Aftermath of 9/11 -- Section 1: Introduction to SCADA Systems -- 1 The Technological Evolution of SCADA Systems -- Early History of SCADA-Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergences -- Generalized Software Architecture -- 2 Remote Terminal Units -- Basic Features and Functions -- Analog inputs -- Analog outputs -- Status inputs -- Contact outputs -- Pulse inputs -- Pulse outputs -- Smart RTU Technologies -- Serial ports -- Local display -- Downloaded logic and parameters -- Regulatory and sequence control -- Low-power operation -- Accumulator freeze -- Global Positioning System time receivers -- Daylight savings time -- Transducer-less AC inputs -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs -- Legacy Protocols -- Protocol Standards -- Network versus serial protocols -- Encapsulated protocols -- IP-Ready RTUs and Protocols -- 3 Telecommunications Technologies -- Voice-Grade (Analog) Telephony -- Telephone technology -- Licensed radio -- Communications backup -- Private telephone systems -- Commercial Voice/Data Carriers -- X.25 packet switching networks -- The digital telephone company -- T1/T3 circuits -- Integrated service digital network -- Frame relay -- DSL technologies -- Options for Wireless Communications -- WiFi and WiMAX -- Cellular -- Digital Networking Technologies -- Frame relay -- Fiber-distributed data interface -- Asynchronous transfer mode -- TCP/IP Networking -- IP suite of protocols -- Secure Socket Layer -- Vpn -- The Internet -- Backbone (including MBONE) -- Internet service providers -- 4 Supervisory Control Applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Opc -- Sql -- Common Object Request Broker Architecture -- Dcom -- Iccp -- Uca2.0 -- 5 Operator Interface -- Access-Control Mechanisms -- Standard System Displays -- Diagnostic displays -- Site/Industry-Specific Displays -- Graphical displays -- Display hierarchy -- Pan and zoom -- Decluttering -- Layering -- Display navigation -- Alarms and indicators -- Alarm filtering -- Alarm annunciation -- Alarm history file -- Alarm-state visual indication -- Historical Trending -- Historical trending displays -- Real-time trending -- Logs and Reports -- Calculated values -- Statistical calculations -- Spreadsheet report generators -- Reports as data-exchange mechanism -- Section 2: Cybersecurity Principles, Processes, and Technologies -- 6 Conventional Information Technology Security -- Availability, Integrity, and Confidentiality -- Remote Access -- TCP/IP Suite -- IP addresses and gateways -- Firewalls -- Classes of attack messages -- Probing and exploring -- Overloading -- Malware delivery -- Wireless LANs -- Rogue APs -- Bluetooth and WiFi ad hoc networks -- Authentication and Validation -- Strong authentication -- Password strategies -- Encryption and Ciphers -- Shared secret -- Key size -- Hash code -- VPNs -- Intrusion Detection -- 7 Identifying CyberSecurity Vulnerabilities -- Threats and Threat Agents -- Internal threats -- External threats -- Targeted attacks -- Obvious Points of Attack and Vulnerability -- Most Frequently Used Means of Attack -- Probability of Attack -- Nonspecific attack probabilities -- Direct attack probabilities -- Guesstimating the Impact of a Successful Attack -- 8 Classifying Cyber Attacks and Cyber Threats -- Web Site/SQL Attacks -- E-mail Attacks -- Malware -- Software that mindlessly reproduces and consumes resources -- Software that inflicts harm once a programmer-specified trigger condition -- is met -- Software that allows a remote party to (re)enter your systems and (re)use -- your resources -- Software that finds and collects sensitive information -- Remote Control/Usage -- Zombie Recruitment -- 9 Physical Security -- Access Controls -- Manual access controls -- Electronic access controls -- Hybrid access controls -- Access Tracking -- Illegal-Entry Alarms -- Physical Isolation of Assets: Layers of Defense -- Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Fire suppression -- Telecommunications -- LANs -- Electric power -- Remote and Field Sites -- IP networking in the field -- 10 Operational Security -- Policies and Administrative Controls -- Procedures -- Procedural validation -- Critical procedure sets -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- 11 Electronic/Systems Security -- Removable Media -- Mobile Electronics -- Bluetooth -- Computer Systems -- PCs -- RTUs -- Section 3: Industrial Sectors -- 12 Electric Utility Industry-Specific Cybersecurity Issues -- Substation Back Doors -- IP to the Substation -- TASE.2/ICCP Connections -- Uca2 (Iec 61850) -- Dnp3.0 -- NERC 1200/1300 Compliance -- 13 Water/Wastewater Industry-Specific Cybersecurity Issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- IP to the Field -- 14 Pipeline Industry-Specific Cybersecurity Issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and E-mail Integration -- Section 4: SCADA Security Architectures -- 15 The Emerging Cyber Threat to SCADA Systems -- 16 Commercial Hardware and Software Vulnerabilities -- Operating System -- Tcp/Ip -- Web Site/Server -- Relational Databases -- Opc -- Dcom -- X-Window -- 17 Traditional Security Features of SCADA Systems -- User Access -- System Configuration -- Application Development -- System Physical Security -- Communications -- Interoperability -- 18 Eliminating the Vulnerabilities of Traditional SCADA Systems -- Technical Security Strategies -- The electronic perimeter -- Operational access -- System programs and supervisory applications -- Configuration data -- Intersystem and intrasystem data exchanges -- RTU communications -- Nontechnical Approaches -- Glossary -- Appendix A: The Department of Energy's "21 Steps to Improved SCADA -- Security" -- Appendix B: NERC 1300 Recommendations for Electric Utilities -- Appendix C: Security Recommendations of the Instruments, Systems, and -- Automation Society and the American Gas Association -- Recommendations of the AGA -- Appendix D: Industry and Government Security Recommendations -- Appendix E: SCADA System Security Assessment Checklists -- Appendix F: Glossary -- Index.
546 $aEnglish.
650 0 $aSupervisory control systems.
650 0 $aAutomatic data collection systems.
650 0 $aData protection.
650 0 $aComputer security.
650 2 $aComputer Security
650 6 $aCommande supervisée.
650 6 $aCollecte automatique des données.
650 6 $aProtection de l'information (Informatique)
650 6 $aSécurité informatique.
650 7 $aAutomatic data collection systems.$2fast$0(OCoLC)fst00822733
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
650 7 $aSupervisory control systems.$2fast$0(OCoLC)fst01139089
655 0 $aElectronic books.
655 4 $aElectronic books.
776 08 $iPrint version:$aShaw, William T.$tCybersecurity for SCADA systems.$dTulsa, Okla. : PennWell Corp., ©2006$z1593700687$w(DLC) 2006013261$w(OCoLC)67921946
830 0 $aKnovel Library.
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio13598689$zACADEMIC - Electrical & Power Engineering
852 8 $blweb$hEBOOKS