جزییات کتاب
Your one-step guide to understanding industrial cybersecurity and its control systems and operationsKey FeaturesLearn about endpoint protection-implement anti-malware and update, monitor, and sanitize user workloads and mobile devicesUnderstand how to secure critical infrastructure systems efficiently with practical examplesGet to grips with the techniques and methodologies of building robust infrastructure systems step by stepBook DescriptionWith advancements in technology, cyber threats have evolved significantly. To keep your organization safe from cyber attacks, it is important to understand your control system's vulnerabilities and learn techniques to defend critical infrastructure systems from cyber threats. This book will help you implement security measures and identify unique security challenges with the help of real-world use cases.Industrial Cybersecurity starts with an introduction to Industrial Control System (ICS) technology, giving you an overview of ICS architectures, communication media, and protocols. You'll then delve into ICS security, and understand ICS-related attack scenarios. You'll learn how to secure ICS, covering network segmentation, defense-in-depth strategies, and protective solutions. As you advance, you'll also get to grips with security assessments, risk management, and security program development. The book takes you through essential cybersecurity aspects such as threat detection and access management, and topics related to endpoint hardening, such as monitoring, updating, and anti-malware implementations.By the end of this cybersecurity book, you will be well-versed with the latest security tools and be able to implement robust security measures for critical infrastructure networks.What you will learnExplore different types of control systemsDesign security-oriented architectures, network segmentation, and security support servicesConfigure event monitoring systems, anti-malware applications, and endpoint securityUnderstand ICS risks, threat detection, and access managementDiscover patch management and life cycle managementSecure your industrial control systems from design through to retirementWho this book is forIf you are a security professional who wants to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in the cybersecurity domain or industrial cybersecurity certifications will also find this book useful.Table of ContentsIndustrial Control SystemsInsecure by InheritanceAnatomy of an ICS Attack ScenarioIndustrial Control System Risk AssessmentThe Purdue Model and a Converged Plantwide EthernetThe Defense-in-depth ModelPhysical ICS SecurityICS Network SecurityICS Computer SecurityICS Application SecurityICS Device SecurityThe ICS Cybersecurity Program Development Process