SCADA Security

SCADA Security
Author : Abdulmohsen Almalawi
Publisher : John Wiley & Sons
Total Pages : 224
Release : 2020-12-10
ISBN 10 : 9781119606079
ISBN 13 : 1119606071
Language : EN, FR, DE, ES & NL

SCADA Security Book Description:

Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems—the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management—can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning. Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book: Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems Describes the relationship between main components and three generations of SCADA systems Explains the classification of a SCADA IDS based on its architecture and implementation Surveys the current literature in the field and suggests possible directions for future research SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.


RELATED BOOKS:
SCADA Security - What's broken and how to fix it
Language: en
Pages: 180
Authors: Andrew Ginter
Categories:
Type: BOOK - Published: 2019-02 - Publisher: Lulu.com

Modern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In ""SCADA Security"" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure,
Critical Information Infrastructure Security
Language: en
Pages: 396
Authors: Roberto Setola, Stefan Geretshuber
Categories: Business & Economics
Type: BOOK - Published: 2009-09-21 - Publisher: Springer Science & Business Media

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Critical Information Infrastructures Security, CRITIS 2008, held in Rome, Italy, in October 2008. The 39 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. All the contributions highlight the current
Critical Infrastructure Protection
Language: en
Pages: 394
Authors: E. Goetz, S. Shenoi
Categories: Computers
Type: BOOK - Published: 2007-11-07 - Publisher: Springer

The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. This book contains a selection of 27 edited papers from
ICT Systems Security and Privacy Protection
Language: en
Pages: 494
Authors: Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
Categories: Computers
Type: BOOK - Published: 2014-05-12 - Publisher: Springer

This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in
Advances in Cyber Security
Language: en
Pages: 602
Authors: Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar
Categories: Computers
Type: BOOK - Published: 2021-12-02 - Publisher: Springer Nature

This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0