Local cover image
Local cover image
Amazon cover image
Image from Amazon.com

Industrial cybersecurity : case studies and best practices / by Steve Mustard

By: Material type: Computer fileComputer fileLanguage: English Publication details: USA : International Society of Automation, 2023Description: 1 online resource (275, pages) : color illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781643311555 (e-book)
Subject(s): LOC classification:
  • TJ222  M97 2023
Online resources:
Contents:
1: Introduction -- 2. What makes industrial cybersecurity different? -- 3. Creating effective policy -- 4. Measure to manage risk -- 5. Standardized design and vendor certification -- 6. Pitfalls of project delivery -- 7. What we can learn from the safety culture -- 8. Safeguarding operational support -- 9. People, poetry, and next steps
Summary: This book provides a practical overview of industrial control systems cybersecurity from governance through design and implementation to operational support. It is for anyone involved in industrial control systems cybersecurity, including asset owners, vendors, system integrators, and consultants, regardless of their level of technical expertise. The term industrial control systems is very broad and, in this context, includes any system that is used to monitor or control physical equipment such as building control systems (e.g., heating, ventilation, and air conditioning systems), water treatment plant supervisory control and data acquisition (SCADA) systems, oil and gas distributed control systems (DCSs), and safety instrumented systems (SISs). The author explains each phase of the process of designing, implementing, and maintaining a successful cybersecurity system, as well as the underlying issues that must be addressed. He emphasizes that the key to success is support and participation from everyone—just like successful safety programs. Topics include: The differences between IT cybersecurity and industrial cybersecurity Creating effective policy for cybersecurity management How to manage cybersecurity risk through measurement Standardized design and vendor certification The pitfalls in managing cybersecurity during project delivery What we can learn from the safety culture Safeguarding operational support
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Materials specified Status Notes Date due Barcode
Online E-Books Online E-Books Ladislao N. Diwa Memorial Library Multimedia Section Non-fiction OEBP TJ222 M97 2023 (Browse shelf(Opens below)) Available PAV OEBP000459
Compact Discs Compact Discs Ladislao N. Diwa Memorial Library Multimedia Section Non-fiction EB TJ222 M97 2023 (Browse shelf(Opens below)) Room use only PAV CD0001388

https://portal.igpublish.com/iglibrary/ is required to read this e-book.

Includes index

1: Introduction -- 2. What makes industrial cybersecurity different? -- 3. Creating effective policy -- 4. Measure to manage risk -- 5. Standardized design and vendor certification -- 6. Pitfalls of project delivery -- 7. What we can learn from the safety culture -- 8. Safeguarding operational support -- 9. People, poetry, and next steps

This book provides a practical overview of industrial control systems cybersecurity from governance through design and implementation to operational support. It is for anyone involved in industrial control systems cybersecurity, including asset owners, vendors, system integrators, and consultants, regardless of their level of technical expertise. The term industrial control systems is very broad and, in this context, includes any system that is used to monitor or control physical equipment such as building control systems (e.g., heating, ventilation, and air conditioning systems), water treatment plant supervisory control and data acquisition (SCADA) systems, oil and gas distributed control systems (DCSs), and safety instrumented systems (SISs). The author explains each phase of the process of designing, implementing, and maintaining a successful cybersecurity system, as well as the underlying issues that must be addressed. He emphasizes that the key to success is support and participation from everyone—just like successful safety programs. Topics include: The differences between IT cybersecurity and industrial cybersecurity Creating effective policy for cybersecurity management How to manage cybersecurity risk through measurement Standardized design and vendor certification The pitfalls in managing cybersecurity during project delivery What we can learn from the safety culture Safeguarding operational support

Fund 164 CE-Logic Purchased February 19, 2024 OEBP000459 P. Roderno PHP 11,970.00
2024-02-0124 2024-1-113

Click on an image to view it in the image viewer

Local cover image
Copyright © 2024. Cavite State University | Koha 23.05