Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 28,76

EUR 12,33 (30%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems par [Knapp, Eric D., Langill, Joel Thomas]
Publicité sur l'appli Kindle

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Format Kindle

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 28,76

Longueur : 360 pages Langue : Anglais

Descriptions du produit

Revue de presse

"One of the most mysterious areas of information security is industrial system security...What raises the mystery even higher is that the stakes in the area of industrial security are extremely high. While the loss of trade secret information may kill a business, the loss of electricity generating capability may kill not just one person, but potentially thousands. And finally the mystery is solved―with this well-researched book on industrial system network security."--Dr. Anton A. Chuvakin, Security Warrior Consulting "For those looking to get a handle on how to effectively secure critical infrastructure networks, Industrial Network Security is an excellent reference… The reality is that industrial system security can be effectively secured, and the book shows the reader exactly how to do that. In 11 densely written chapters, the book covers all of the necessary areas in which to secure critical infrastructure systems… For those looking for a solid overview of the topic, Industrial Network Security is an excellent reference."--Security Management

Présentation de l'éditeur

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented.
Divided into 11 chapters, the book explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also discusses industrial networks as they relate to “critical infrastructure” and cyber security, potential risks and consequences of a cyber attack against an industrial control system, compliance controls in relation to network security practices, industrial network protocols, such as Modbus and DNP3, assessment of vulnerabilities and risk, how to secure enclaves, regulatory compliance standards applicable to industrial network security, and common pitfalls and mistakes, like complacency and deployment errors.
This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines.

  • Covers implementation guidelines for security measures of critical infrastructure
  • Applies the security measures for system-specific compliance
  • Discusses common pitfalls and mistakes and how to avoid them

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 2837 KB
  • Nombre de pages de l'édition imprimée : 360 pages
  • Editeur : Syngress; Édition : 1 (28 septembre 2011)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B005GDZL3M
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°558.803 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) HASH(0x8f47539c) étoiles sur 5 9 commentaires
23 internautes sur 26 ont trouvé ce commentaire utile 
HASH(0x8f1dff84) étoiles sur 5 Mixed Bag But Good On Detection and Monitoring of ICS 5 septembre 2011
Par Dale Peterson - Publié sur
Format: Broché Achat vérifié
Eric Knapp's book Industrial Network Security shipped this month and is also available for the Kindle. It is a tough book to review because the quality and accuracy was very uneven. As compared to other ICS Security books available today, grading on a curve, it deserves 4 stars out of a possible 5. However, it would only rate 2 stars if there was a high quality book on applying technical and administrative IT security to control systems. Unfortunately that book has not yet been written.

The highlights of this book are Chapter 8: Exception, Anomaly and Threat Detection and Chapter 9: Monitoring Enclaves. Not surprising since Eric works for SIEM vendor NitroSecurity (fd: NitroSecurity advertises on He covers in detail detection and monitoring for general networks and then with specific ICS examples. For example, Figure 9.12 shows a SIEM dashboard monitoring PI activity such as PI Trust Granted, PI Point Deletion and PI Point Alteration. I'll be rereading these chapters, and they would be helpful for a control system engineer trying to learn security.

Unfortunately I cannot recommend this book for an IT security professional who wants to learn about control systems. There is a lot of important information and good advice, but they would also be misled in important and numerous ways. The two most egregious examples are:

1. The author spends a lot of time on enclaves, his term for security zones. He follows that basics of the Purdue model, but his use of the SCADA DMZ is troubling. It is likely that an IT Security professional reading this would think that pipeline, water canal or transmission SCADA servers and workstations should go in a SCADA DMZ and be directly accessible from the corporate network through a perimeter security device. This does not reflect what is going on in actual ICS, what you would want if you were developing an ICS security architecture, nor the recommendations in the standards and guidelines today. It is missing important, real world discussions of control centers, plant floors, SCADA field sites, and DMZ's between control centers and business networks.

2. When defining components in an ICS the author has all of the HMI's communicating directly with the PLC's; he is missing the SCADA or Realtime Server that is common, especially in larger, critical infrastructure control systems. This is one of the most important servers to secure and it is not even mentioned.

There are enough other instances that were either wrong or not characterized as well as they should be that an IT Security Professional would be led down the wrong path by reading this book because they don't have the experience to know what is accurate.

There are gems in this book where I wrote YES in the margin, the reader just has to sift through the earth to find them. However, at 341-pages there is a lot of earth here and a control system engineer would learn from reading this book. It clearly is better than the Techno Security book because it does speak directly to ICS and a lot more detailed than the ISA/Teumim book with the same title that is 200 pages shorter and with a big font.

My reading recommendation is to start with Chapter 5, then Chapter 4, followed by Chapters 7, 8, and 9. Some other reading suggestions:

- The Tips that are broken out are some of the best and most concise info in the book.

- Also excellent are the tables that pull out the key requirements from various NIST, NISCC, ISA and other standards and guideline documents. The author then adds context and information on meeting the requirements. The tables are dense with info, but are worth reading.

- Skip the frustrating Chapters 2 and 3. The title of the chapters does not reflect what is in the chapter. For example, Chapter 3: Introduction to Industrial Network Security is mostly about APT and Cyber War, and even there the APT discussion is wrong. Chapter 2: About Industrial Networks is actually covered better in Chapter 5 -- just go straight to Chapter 5. I blame the editor for allowing Chapters 2 and 3, and hopefully not too many readers will lose interest before getting to the much better content.

- Smart Grid is discussed in a cursory way that is just a distraction. But again this is mostly in the earlier chapters that you should skip. (Note: this book continues the annoying trend in the US of saying smart grid but really meaning AMI rather than the diversity of projects under the smart grid umbrella.)

- Chapter 7: Establishing Secure Enclaves should be read just as background for the excellent Chapters 8 and 9. The author makes creating security zones unnecessarily complex, and even states that 5 different security zone levels is likely to be insufficient. I would have also preferred some priorities of zones. For example, first to segment the control systems from untrusted networks such as the business network -- and mediate the minimal required communication through a DMZ. Next to segment SCADA field sites from the control center and other field sites, ...

- Securing remote access is not covered in detail in this book. This is a significant omission given that almost every ICS requires for emergency remote access and vendor support.

As I wrote in the beginning, this was a tough book to review with all its highlights and lowlights. Salute the authors serious and substantial effort to produce a book of this size and detail, focus on Chapters 8 and 9, and hope for an improved second edition.

And we still await the definitive book on applying security technical and administrative controls to ICS.
4 internautes sur 4 ont trouvé ce commentaire utile 
HASH(0x8f1e41ec) étoiles sur 5 Solid SCADA overview 2 septembre 2012
Par Ben Rothke - Publié sur
Format: Broché
The Stuxnet computer worm of mid-2010 was a huge wake-up call for the energy industry. It also catapulted SCADA from an obscure term to the forefront of industrial security. But nearly two years later, it is unclear if the energy sector is adequately prepared for sophisticated information security threats.

For those looking to get a handle on how to effectively secure critical infrastructure networks, Industrial Network Security is an excellent reference.

In the book's forward, Dr. Anton Chuvakin writes that "one of the most mysterious areas of information security is industrial system security." The reality is that industrial system security can be effectively secured, and the book shows the reader exactly how to do that. In 11 densely written chapters, the book covers all of the necessary areas in which to secure critical infrastructure systems.

The first three chapters provide an introduction to industrial security, SCADA, and control systems. Chapter four then goes into detail about industrial network protocols. The obscurity of these protocols was thought to be a boon to SCADA systems in the past in that attackers were oblivious to their inner workings. In today's world, however, those who intend to attack can learn how to do it.

The book concludes with a chapter on common pitfalls and mistakes. This is a particularly valuable chapter because many companies look for quick and easy approaches to information security but do not provide adequate staff, budget, or time to get the job done. Firms that make those mistakes are likely to be victims of a security breach.

For those looking for a solid overview of the topic, Industrial Network Security is an excellent reference.
1 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x8f1e442c) étoiles sur 5 Excellent Textbook and Desk Reference 6 novembre 2013
Par Ernest N. Hayden - Publié sur
Format: Broché Achat vérifié
I've been directly involved with Industrial Control Security in one way or another for the past 10+ years and I've been trying to locate the best text and reference on the subject. I've read most of the books that are published on the subject including NIST 800-82 and I've found that Eric Knapp's book on Industrial Network Security is currently the best on the shelf!

I've used his book to study such issues as enclaving and to get more background on some of the key protocols. But in general, Eric's book is at the top of my reference list when researching specific topics in ICS security.

I would highly recommend this book to anyone wanting to learn more about Industrial Controls Systems security.
2 internautes sur 2 ont trouvé ce commentaire utile 
HASH(0x8f1e45d0) étoiles sur 5 I love this book.. 29 janvier 2013
Par P. Kamal - Publié sur
Format: Broché Achat vérifié
I am a security professional who has worked in the SCADA Industry in the past. My current role requires me to be up to speed on cyber security as well as security for Industrial Control Systems.

I found this book had just the right mix of technical detail and conceptual elements to be very useful to me. I have used this book, reading it from cover to cover to gain useful insight into almost all elements of Industrial Control Security.

I find myself coming back to the book as a reference source to review concepts. To that end I really like the logical flow of how the book is organized. For me the progression of Industrial Networks, Industrial Network Security, then protocols, establishing enclaves, monitoring enclaves, common pitfalls, all make sense.

The chapters on Vulnerabilities and Risk Asessment, Exceptions and Anomalies, Standard and Regulations are nice add-ons as well.

Unlike many super technical books, Eric's writing style is great and makes it easy to get through the book. Thats the part I like the best. I would recommend this book to people looking to learn more about Industrial Control Security. I would also recommend this book to people already in thie field or related security fields.

- Pan Kamal.
Vice President, Marketing,
1 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x8f1e44a4) étoiles sur 5 Not for the Chicken-Hearted 2 mai 2013
Par Andrew A. Bochman - Publié sur
Format: Broché Achat vérifié
In order to attempt to consume the info in Eric Knapp's book, you've either got to be working with ICS on a daily basis, or else have an incredible burning need and passion to know more about how these systems and networks are put together, how they are exposed to bad guys, and how to begin to better protect them.

I'm in the latter category, and have to admit that even though my zeal for national and energy security could often be categorized as bordering on incendiary, there were times reading this book when my flame flickered a bit. Nevertheless, I found the text approachable, informative and largely engaging.

I think that Dale Peterson's comprehensive Amazon review, which gives credit for what he finds helpful but also critiques several aspects of the book as sub-optimal, is nevertheless a generous effort motivated by an urge to advance the state of understanding on this very important topic. Actually, depending on the level of expertise and experience you bring to this book, his review can help you navigate it in ways that suit your needs.

Final comment: I would like to challenge Eric to combine his worlds and get a little fowl humor into his technical writing and a little more tech into his chicken-zombie narratives. Eric - please keep me/us posted on your success with this challenge. ab
Ces commentaires ont-ils été utiles ? Dites-le-nous