undrgrnd Cliquez ici Toys NEWNEEEW nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici Rentrée scolaire Cliquez ici Acheter Fire Shop Kindle Paperwhite cliquez_ici Jeux Vidéo Bijoux Marsala Bijoux Montres bijoux Fantaisie
Industrial Network Security et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 41,09
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Industrial Network Securi... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems (Anglais) Broché – 15 août 2011

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 41,09
EUR 29,30 EUR 31,62

Livres anglais et étrangers
Lisez en version originale. Cliquez ici

Descriptions du produit

Revue de presse

"One of the most mysterious areas of information security is industrial system security...What raises the mystery even higher is that the stakes in the area of industrial security are extremely high. While the loss of trade secret information may kill a business, the loss of electricity generating capability may kill not just one person, but potentially thousands. And finally the mystery is solved-with this well-researched book on industrial system network security."--Dr. Anton A. Chuvakin, Security Warrior Consulting "For those looking to get a handle on how to effectively secure critical infrastructure networks, Industrial Network Security is an excellent reference… The reality is that industrial system security can be effectively secured, and the book shows the reader exactly how to do that. In 11 densely written chapters, the book covers all of the necessary areas in which to secure critical infrastructure systems… For those looking for a solid overview of the topic, Industrial Network Security is an excellent reference."--Security Management

Présentation de l'éditeur

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented.
Divided into 11 chapters, the book explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also discusses industrial networks as they relate to “critical infrastructure” and cyber security, potential risks and consequences of a cyber attack against an industrial control system, compliance controls in relation to network security practices, industrial network protocols, such as Modbus and DNP3, assessment of vulnerabilities and risk, how to secure enclaves, regulatory compliance standards applicable to industrial network security, and common pitfalls and mistakes, like complacency and deployment errors.
This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines.

  • Covers implementation guidelines for security measures of critical infrastructure
  • Applies the security measures for system-specific compliance
  • Discusses common pitfalls and mistakes and how to avoid them

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 9 commentaires
23 internautes sur 26 ont trouvé ce commentaire utile 
Mixed Bag But Good On Detection and Monitoring of ICS 5 septembre 2011
Par Dale Peterson - Publié sur Amazon.com
Format: Broché Achat vérifié
Eric Knapp's book Industrial Network Security shipped this month and is also available for the Kindle. It is a tough book to review because the quality and accuracy was very uneven. As compared to other ICS Security books available today, grading on a curve, it deserves 4 stars out of a possible 5. However, it would only rate 2 stars if there was a high quality book on applying technical and administrative IT security to control systems. Unfortunately that book has not yet been written.

The highlights of this book are Chapter 8: Exception, Anomaly and Threat Detection and Chapter 9: Monitoring Enclaves. Not surprising since Eric works for SIEM vendor NitroSecurity (fd: NitroSecurity advertises on digitalbond.com). He covers in detail detection and monitoring for general networks and then with specific ICS examples. For example, Figure 9.12 shows a SIEM dashboard monitoring PI activity such as PI Trust Granted, PI Point Deletion and PI Point Alteration. I'll be rereading these chapters, and they would be helpful for a control system engineer trying to learn security.

Unfortunately I cannot recommend this book for an IT security professional who wants to learn about control systems. There is a lot of important information and good advice, but they would also be misled in important and numerous ways. The two most egregious examples are:

1. The author spends a lot of time on enclaves, his term for security zones. He follows that basics of the Purdue model, but his use of the SCADA DMZ is troubling. It is likely that an IT Security professional reading this would think that pipeline, water canal or transmission SCADA servers and workstations should go in a SCADA DMZ and be directly accessible from the corporate network through a perimeter security device. This does not reflect what is going on in actual ICS, what you would want if you were developing an ICS security architecture, nor the recommendations in the standards and guidelines today. It is missing important, real world discussions of control centers, plant floors, SCADA field sites, and DMZ's between control centers and business networks.

2. When defining components in an ICS the author has all of the HMI's communicating directly with the PLC's; he is missing the SCADA or Realtime Server that is common, especially in larger, critical infrastructure control systems. This is one of the most important servers to secure and it is not even mentioned.

There are enough other instances that were either wrong or not characterized as well as they should be that an IT Security Professional would be led down the wrong path by reading this book because they don't have the experience to know what is accurate.

There are gems in this book where I wrote YES in the margin, the reader just has to sift through the earth to find them. However, at 341-pages there is a lot of earth here and a control system engineer would learn from reading this book. It clearly is better than the Techno Security book because it does speak directly to ICS and a lot more detailed than the ISA/Teumim book with the same title that is 200 pages shorter and with a big font.

My reading recommendation is to start with Chapter 5, then Chapter 4, followed by Chapters 7, 8, and 9. Some other reading suggestions:

- The Tips that are broken out are some of the best and most concise info in the book.

- Also excellent are the tables that pull out the key requirements from various NIST, NISCC, ISA and other standards and guideline documents. The author then adds context and information on meeting the requirements. The tables are dense with info, but are worth reading.

- Skip the frustrating Chapters 2 and 3. The title of the chapters does not reflect what is in the chapter. For example, Chapter 3: Introduction to Industrial Network Security is mostly about APT and Cyber War, and even there the APT discussion is wrong. Chapter 2: About Industrial Networks is actually covered better in Chapter 5 -- just go straight to Chapter 5. I blame the editor for allowing Chapters 2 and 3, and hopefully not too many readers will lose interest before getting to the much better content.

- Smart Grid is discussed in a cursory way that is just a distraction. But again this is mostly in the earlier chapters that you should skip. (Note: this book continues the annoying trend in the US of saying smart grid but really meaning AMI rather than the diversity of projects under the smart grid umbrella.)

- Chapter 7: Establishing Secure Enclaves should be read just as background for the excellent Chapters 8 and 9. The author makes creating security zones unnecessarily complex, and even states that 5 different security zone levels is likely to be insufficient. I would have also preferred some priorities of zones. For example, first to segment the control systems from untrusted networks such as the business network -- and mediate the minimal required communication through a DMZ. Next to segment SCADA field sites from the control center and other field sites, ...

- Securing remote access is not covered in detail in this book. This is a significant omission given that almost every ICS requires for emergency remote access and vendor support.

As I wrote in the beginning, this was a tough book to review with all its highlights and lowlights. Salute the authors serious and substantial effort to produce a book of this size and detail, focus on Chapters 8 and 9, and hope for an improved second edition.

And we still await the definitive book on applying security technical and administrative controls to ICS.
3 internautes sur 3 ont trouvé ce commentaire utile 
Solid SCADA overview 2 septembre 2012
Par Ben Rothke - Publié sur Amazon.com
Format: Broché
The Stuxnet computer worm of mid-2010 was a huge wake-up call for the energy industry. It also catapulted SCADA from an obscure term to the forefront of industrial security. But nearly two years later, it is unclear if the energy sector is adequately prepared for sophisticated information security threats.

For those looking to get a handle on how to effectively secure critical infrastructure networks, Industrial Network Security is an excellent reference.

In the book's forward, Dr. Anton Chuvakin writes that "one of the most mysterious areas of information security is industrial system security." The reality is that industrial system security can be effectively secured, and the book shows the reader exactly how to do that. In 11 densely written chapters, the book covers all of the necessary areas in which to secure critical infrastructure systems.

The first three chapters provide an introduction to industrial security, SCADA, and control systems. Chapter four then goes into detail about industrial network protocols. The obscurity of these protocols was thought to be a boon to SCADA systems in the past in that attackers were oblivious to their inner workings. In today's world, however, those who intend to attack can learn how to do it.

The book concludes with a chapter on common pitfalls and mistakes. This is a particularly valuable chapter because many companies look for quick and easy approaches to information security but do not provide adequate staff, budget, or time to get the job done. Firms that make those mistakes are likely to be victims of a security breach.

For those looking for a solid overview of the topic, Industrial Network Security is an excellent reference.
2 internautes sur 2 ont trouvé ce commentaire utile 
I love this book.. 29 janvier 2013
Par P. Kamal - Publié sur Amazon.com
Format: Broché Achat vérifié
I am a security professional who has worked in the SCADA Industry in the past. My current role requires me to be up to speed on cyber security as well as security for Industrial Control Systems.

I found this book had just the right mix of technical detail and conceptual elements to be very useful to me. I have used this book, reading it from cover to cover to gain useful insight into almost all elements of Industrial Control Security.

I find myself coming back to the book as a reference source to review concepts. To that end I really like the logical flow of how the book is organized. For me the progression of Industrial Networks, Industrial Network Security, then protocols, establishing enclaves, monitoring enclaves, common pitfalls, all make sense.

The chapters on Vulnerabilities and Risk Asessment, Exceptions and Anomalies, Standard and Regulations are nice add-ons as well.

Unlike many super technical books, Eric's writing style is great and makes it easy to get through the book. Thats the part I like the best. I would recommend this book to people looking to learn more about Industrial Control Security. I would also recommend this book to people already in thie field or related security fields.

- Pan Kamal.
Vice President, Marketing,
1 internautes sur 1 ont trouvé ce commentaire utile 
Industrial Network Security 25 mai 2013
Par D.F. NAGY - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Title: Industrial Network Security,

Author: Eric D. Knapp

ISBN 978-1-59749-645-2

Date of publication: 29th August 2011

Number of Pages: 360

I am a networking professional with over 20 years experience. In the last few months I moved into a new role working with industrial networks. Therefore I was looking for a book that would provide me with an overview of network security in the industrial environments.

The content appears to be structured as follows:

Chapters 1-4 gives and introduction into the terminology and standards used. Here the security concepts are briefly explained. The life cycle of an industrial network and in part also relates this to some of the security weaknesses. This section also covers a brief discussion into vulnerabilities that can provide threats to a network. There is also a description of industrial networking protocol which gives you an idea of what the requirements such as timing and availability.

Chapter 5-7 provides a more detailed description into the components that make up an industrial network. This also looks into network design in how secure enclaves are established and the enforcement of demarcation points. These chapters provide bases for the network design architecture for a typical industrial network. These chapters also talk about the types of attacks, possible attackers and motives and the vulnerabilities that may exist.

Chapter 8-9 describes the operational behavior of an industrial network. This is essentially determining what abnormal behavior verses normal behavior is. This looks at the tools that are available to correlate events logs, audit logs, statistics and event records from the industrial systems. Chapter 9 provides an appreciation that the amount of logged data could be quite considerable since every network component\machine produces one or more type of logs. Often a number of logs may need to be correlated to detect that the network is under attack. This chapter also makes you aware that there are tools that will help to perform much of the work to process the collected data.

Chapter 10 describes various standards relating the network and information security some of which are specific to the industrial sector. These standards mentioned in the chapter range from what a network conforms to and also what is legally required. Most of this chapter consists of a table that gives conformance controls and recommendations to satisfy these. This can provide use input into the design phase of a project for the roll out of a network.

Chapter 11 looks at the common mistakes made in building, designing and operating industrial networks. This chapter does place an emphasis that the main weakness is the humans that work with the network. These weaknesses are highlighted and complacency, error or malicious behavior. Therefore it does place an emphasis on communicating security awareness. The text highlights the fact that security is an on going process as opposed to an implement once project.

The content covers the breadth of subjects that you are likely to find in an industrial network. If you require greater depth then often there are references to standards that you can refer to. With respect to some the networking components like firewalls, IPS/IDS systems it provides a description but it won't turn you into an expert in these areas.

With respect to readability I would day that that it is easy to follow and clearly explains the concepts and components of network security with good use of diagrams to highlight the points in the text. There are a number of tables in particular for tables and standards with suggested recommendations that can be translated to good design practices.

Having read this book it met my personal objective of obtaining a good overview of industrial networking. From my experience so far with industrial network many of it all of the areas covered in this book are relevant to what I encounter as a plant network security engineer.

I would recommend the book for anyone who is new to industrial networking and security as it will provide you with good background information. Additionally I think it provide a good reference book for network designers as it provides good explanations into the security concepts. If you already have a technical background where you already have a network and/or information security background then this book will help you to understand the specifics that are relevant to industrial network.

To sum up this is a very good book and would recommend this to professionals involved in industrial networking security.
1 internautes sur 1 ont trouvé ce commentaire utile 
Not for the Chicken-Hearted 2 mai 2013
Par Andrew A. Bochman - Publié sur Amazon.com
Format: Broché Achat vérifié
In order to attempt to consume the info in Eric Knapp's book, you've either got to be working with ICS on a daily basis, or else have an incredible burning need and passion to know more about how these systems and networks are put together, how they are exposed to bad guys, and how to begin to better protect them.

I'm in the latter category, and have to admit that even though my zeal for national and energy security could often be categorized as bordering on incendiary, there were times reading this book when my flame flickered a bit. Nevertheless, I found the text approachable, informative and largely engaging.

I think that Dale Peterson's comprehensive Amazon review, which gives credit for what he finds helpful but also critiques several aspects of the book as sub-optimal, is nevertheless a generous effort motivated by an urge to advance the state of understanding on this very important topic. Actually, depending on the level of expertise and experience you bring to this book, his review can help you navigate it in ways that suit your needs.

Final comment: I would like to challenge Eric to combine his worlds and get a little fowl humor into his technical writing and a little more tech into his chicken-zombie narratives. Eric - please keep me/us posted on your success with this challenge. ab
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?