Read more
Informationen zum Autor Greg Miles,(Ph.D., CISSP#24431, CISM#0300338, IAM, IEM)is the President, and Chief Financial Officer of Security Horizon, Inc. Security Horizon is a Global, Veteran-Owned Small Business headquartered in Colorado Springs, Colorado. Klappentext Around the world! SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment! chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security! these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware! sidejacking! biometric applications! emergency communications! security awareness llanning! personnel & workpla Inhaltsverzeichnis Foreword Chapter 1: Physical Security: SCADA and the Critical Infrastructure's Biggest Vulnerability Chapter 2: Supervisory Control and Data Acquisition Chapter 3: SCADA Security Assessment Methodology Chapter 4: Developing an Effective Security Awareness Program Chapter 5: Working with Law Enforcement on SCADA Incidents Chapter 6:Locked but Not Secure: An Overview of Conventional and High Security Locks Chapter 7: Bomb Threat Planning: Things Have Changed Chapter 8: Biometric Authentication for SCADA Security Appendix: Personal, Workforce, and Family Preparedness Index
List of contents
Foreword
Chapter 1: Physical Security: SCADA and the Critical Infrastructure's Biggest Vulnerability
Chapter 2: Supervisory Control and Data Acquisition
Chapter 3: SCADA Security Assessment Methodology
Chapter 4: Developing an Effective Security Awareness Program
Chapter 5: Working with Law Enforcement on SCADA Incidents
Chapter 6:Locked but Not Secure: An Overview of Conventional and High Security Locks
Chapter 7: Bomb Threat Planning: Things Have Changed
Chapter 8: Biometric Authentication for SCADA Security
Appendix: Personal, Workforce, and Family Preparedness
Index